【TWCERT/CC安全通報】TW-CA-2005-025-[RHSA-2005:173-01: Moderate:

看板NetSecurity (資安 資訊安全)作者時間20年前 (2005/03/04 18:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
※ 本文轉錄自 [Lan] 信箱 作者: twcert@cert.org.tw (TWCERT/CC Fellows) 標題: 【TWCERT/CC安全通報】TW-CA-2005-025-[RHSA-2005 時間: Fri Mar 4 17:40:57 2005 -----BEGIN PGP SIGNED MESSAGE----- TW-CA-2005-025-[RHSA-2005:173-01: Moderate: squid security update] ──────────────────────────────────────── TWCERT/CC發布日期:2005-03-04 原漏洞發布日期:2005-03-03 原漏洞最新更新日期:-- 通用安全漏洞編號:CAN-2005-0446 分類:Dos, 來源參考:RHSA-2005:173-01 ──── 簡述 ───────────────────────────────── 更新 squid 套件,修正阻斷服務攻擊弱點。 Red Hat Security Response Team 將此列為高度安全性更新。 ──── 說明 ───────────────────────────────── Squid 是全功能的 Web proxy cache。 Squid 在處理 FQDN 檢視時存在錯誤。利用傳送特別設計的 DNS 回應給 FQDN 檢視可能會造成 Squid 伺服器當機。CVE (cve.mitre.org) 已將此問題命名為 CAN-2005-0446 。 建議 squid 使用者更新此勘誤套件,如此即不會受此問題影響。 ──── 影響平台 ─────────────────────────────── ‧Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 ‧Red Hat Linux Advanced Workstation 2.1 - ia64 ‧Red Hat Enterprise Linux ES version 2.1 - i386 ‧Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 ‧Red Hat Desktop version 3 - i386, x86_64 ‧Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 ‧Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 ──── 修正方式 ─────────────────────────────── 在安裝更新之前,確定已安裝之前所有跟系統相關的錯誤修正。使用 Red Hat Network 來 下載及更新套件,輸入以下指令啟動 Red Hat Update Agent: up2date 若要獲得更多手動安裝套件的資訊,請參閱下面網址,尋求適合您系統的指引手冊: http://www.redhat.com/docs/manuals/enterprise/ Bug IDs fixed(詳見 http://bugzilla.redhat.com/): 148882 - CAN-2005-0446 Squid DoS[阻斷服務攻擊] from bad DNS response RPMs 需求: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5 src.rpm 63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm i386: 81505707ca33f4870a62382b88745bbc squid-2.4.STABLE7-1.21as.5.i386.rpm ia64: c3a025c8b1847017da5e05d039e3bcc0 squid-2.4.STABLE7-1.21as.5.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5 src.rpm 63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm ia64: c3a025c8b1847017da5e05d039e3bcc0 squid-2.4.STABLE7-1.21as.5.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5 src.rpm 63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm i386: 81505707ca33f4870a62382b88745bbc squid-2.4.STABLE7-1.21as.5.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src rpm ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm i386: 25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm ia64: 429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm ppc: e3f3bab5baefba94302135e61499683f squid-2.5.STABLE3-6.3E.8.ppc.rpm s390: 0c97fc7f12ac29445de550ec866feb82 squid-2.5.STABLE3-6.3E.8.s390.rpm s390x: 9a2a1b5c70a510695ee560fe55358228 squid-2.5.STABLE3-6.3E.8.s390x.rpm x86_64: c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/squid-2.5.STABLE3-6.3E. 8.src.rpm ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm i386: 25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm x86_64: c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src rpm ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm i386: 25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm ia64: 429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm x86_64: c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src rpm ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm i386: 25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm ia64: 429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm x86_64: c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm 這些套件基於安全理由,均由 Red Hat 公司使用 GPG 簽章,可至下列網址取得 key: https://www.redhat.com/security/team/key.html#package ──── 影響結果 ─────────────────────────────── ──── 聯絡TWCERT/CC ───────────────────────────── Tel: 886-7-5250211 FAX: 886-7-5250212 886-2-23563303 886-2-23924082 Email: twcert@cert.org.tw URL: http://www.cert.org.tw/ PGP key: http://www.cert.org.tw/eng/pgp.htm ──────────────────────────────────────── 附件:[Moderate: squid security update] ──── 原文 ───────────────────────────────── - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: squid security update Advisory ID: RHSA-2005:173-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-173.html Issue date: 2005-03-03 Updated on: 2005-03-03 Product: Red Hat Enterprise Linux CVE Names: CAN-2005-0446 - - --------------------------------------------------------------------- 1. Summary: Updated squid packages that fix a denial of service issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Problem description: Squid is a full-featured Web proxy cache. A bug was found in the way Squid handles FQDN lookups. It was possible to crash the Squid server by sending a carefully crafted DNS response to an FQDN lookup. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0446 to this issue. Users of squid should upgrade to this updated package, which contains a backported patch, and is not vulnerable to this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 148882 - CAN-2005-0446 Squid DoS from bad DNS response 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5 src.rpm 63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm i386: 81505707ca33f4870a62382b88745bbc squid-2.4.STABLE7-1.21as.5.i386.rpm ia64: c3a025c8b1847017da5e05d039e3bcc0 squid-2.4.STABLE7-1.21as.5.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5 src.rpm 63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm ia64: c3a025c8b1847017da5e05d039e3bcc0 squid-2.4.STABLE7-1.21as.5.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5 src.rpm 63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm i386: 81505707ca33f4870a62382b88745bbc squid-2.4.STABLE7-1.21as.5.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src rpm ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm i386: 25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm ia64: 429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm ppc: e3f3bab5baefba94302135e61499683f squid-2.5.STABLE3-6.3E.8.ppc.rpm s390: 0c97fc7f12ac29445de550ec866feb82 squid-2.5.STABLE3-6.3E.8.s390.rpm s390x: 9a2a1b5c70a510695ee560fe55358228 squid-2.5.STABLE3-6.3E.8.s390x.rpm x86_64: c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/squid-2.5.STABLE3-6.3E. 8.src.rpm ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm i386: 25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm x86_64: c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src rpm ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm i386: 25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm ia64: 429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm x86_64: c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src rpm ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm i386: 25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm ia64: 429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm x86_64: c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE8-dns_assert http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0446 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ ──────────────────────────────────────── -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.4 iQEVAwUBQigqAacyQYefg2/NAQGtAwgAlyWgQjudc3p4w/MF970rtXQBjAtX0/oU SOoAxFbrXxn2Lc7jL4u/UAVYtFKbkPSUOChaH9oAGk7/tx3W2L4knlVdxbSrm/wB xW/fQ0jcgE8ONonBokRhq7XjGKus+NFCA7+qQ756wQCKy7A+03Zs0FrvY5QAgH+C 8toUfSmaberHYlaJyr+3vzbR0/ccH4H94quiEZBwAVI6U4HwUBPZeTMRf1QjIKOn QuWixxpXNScEiEO6/y9nLtAmRISKcM3nvgfezXHkvQSvVEhJic7lbkAv7epA+RrS LNagoelMUGPEz4PuH/k6g2u6aieqAcFY3OExLgNVc+sKjmljqylynA== =jK+y -----END PGP SIGNATURE----- -- Taiwan Computer Emergency Response Team Security Advisory mailing list. Mail to : Majordomo@cert.org.tw and include a line "subscribe advisory". Please visit http://www.cert.org.tw/. PGP key : http://www.cert.org.tw/eng/pgp.htm
文章代碼(AID): #12A3ad00 (NetSecurity)
文章代碼(AID): #12A3ad00 (NetSecurity)