【TWCERT/CC安全通報】TW-CA-2005-025-[RHSA-2005:173-01: Moderate:
※ 本文轉錄自 [Lan] 信箱
作者: twcert@cert.org.tw (TWCERT/CC Fellows)
標題: 【TWCERT/CC安全通報】TW-CA-2005-025-[RHSA-2005
時間: Fri Mar 4 17:40:57 2005
-----BEGIN PGP SIGNED MESSAGE-----
TW-CA-2005-025-[RHSA-2005:173-01: Moderate: squid security update]
────────────────────────────────────────
TWCERT/CC發布日期:2005-03-04
原漏洞發布日期:2005-03-03
原漏洞最新更新日期:--
通用安全漏洞編號:CAN-2005-0446
分類:Dos,
來源參考:RHSA-2005:173-01
──── 簡述 ─────────────────────────────────
更新 squid 套件,修正阻斷服務攻擊弱點。
Red Hat Security Response Team 將此列為高度安全性更新。
──── 說明 ─────────────────────────────────
Squid 是全功能的 Web proxy cache。
Squid 在處理 FQDN 檢視時存在錯誤。利用傳送特別設計的 DNS 回應給 FQDN
檢視可能會造成 Squid 伺服器當機。CVE (cve.mitre.org) 已將此問題命名為
CAN-2005-0446 。
建議 squid 使用者更新此勘誤套件,如此即不會受此問題影響。
──── 影響平台 ───────────────────────────────
‧Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
‧Red Hat Linux Advanced Workstation 2.1 - ia64
‧Red Hat Enterprise Linux ES version 2.1 - i386
‧Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
‧Red Hat Desktop version 3 - i386, x86_64
‧Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
‧Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
──── 修正方式 ───────────────────────────────
在安裝更新之前,確定已安裝之前所有跟系統相關的錯誤修正。使用 Red Hat Network 來
下載及更新套件,輸入以下指令啟動 Red Hat Update Agent:
up2date
若要獲得更多手動安裝套件的資訊,請參閱下面網址,尋求適合您系統的指引手冊:
http://www.redhat.com/docs/manuals/enterprise/
Bug IDs fixed(詳見 http://bugzilla.redhat.com/):
148882 - CAN-2005-0446 Squid
DoS[阻斷服務攻擊] from bad DNS
response
RPMs 需求:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5
src.rpm
63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm
i386:
81505707ca33f4870a62382b88745bbc squid-2.4.STABLE7-1.21as.5.i386.rpm
ia64:
c3a025c8b1847017da5e05d039e3bcc0 squid-2.4.STABLE7-1.21as.5.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5
src.rpm
63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm
ia64:
c3a025c8b1847017da5e05d039e3bcc0 squid-2.4.STABLE7-1.21as.5.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5
src.rpm
63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm
i386:
81505707ca33f4870a62382b88745bbc squid-2.4.STABLE7-1.21as.5.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src
rpm
ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm
i386:
25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm
ia64:
429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm
ppc:
e3f3bab5baefba94302135e61499683f squid-2.5.STABLE3-6.3E.8.ppc.rpm
s390:
0c97fc7f12ac29445de550ec866feb82 squid-2.5.STABLE3-6.3E.8.s390.rpm
s390x:
9a2a1b5c70a510695ee560fe55358228 squid-2.5.STABLE3-6.3E.8.s390x.rpm
x86_64:
c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/squid-2.5.STABLE3-6.3E.
8.src.rpm
ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm
i386:
25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm
x86_64:
c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src
rpm
ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm
i386:
25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm
ia64:
429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm
x86_64:
c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src
rpm
ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm
i386:
25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm
ia64:
429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm
x86_64:
c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm
這些套件基於安全理由,均由 Red Hat 公司使用 GPG 簽章,可至下列網址取得 key:
https://www.redhat.com/security/team/key.html#package
──── 影響結果 ───────────────────────────────
──── 聯絡TWCERT/CC ─────────────────────────────
Tel: 886-7-5250211 FAX: 886-7-5250212
886-2-23563303 886-2-23924082
Email: twcert@cert.org.tw
URL: http://www.cert.org.tw/
PGP key: http://www.cert.org.tw/eng/pgp.htm
────────────────────────────────────────
附件:[Moderate: squid security update]
──── 原文 ─────────────────────────────────
- - ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Moderate: squid security update
Advisory ID: RHSA-2005:173-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-173.html
Issue date: 2005-03-03
Updated on: 2005-03-03
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0446
- - ---------------------------------------------------------------------
1. Summary:
Updated squid packages that fix a denial of service issue are now available.
This update has been rated as having important security impact by the Red
Hat Security Response Team
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Problem description:
Squid is a full-featured Web proxy cache.
A bug was found in the way Squid handles FQDN lookups. It was possible
to crash the Squid server by sending a carefully crafted DNS response to
an FQDN lookup. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0446 to this issue.
Users of squid should upgrade to this updated package, which contains a
backported patch, and is not vulnerable to this issue.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
148882 - CAN-2005-0446 Squid DoS from bad DNS response
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5
src.rpm
63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm
i386:
81505707ca33f4870a62382b88745bbc squid-2.4.STABLE7-1.21as.5.i386.rpm
ia64:
c3a025c8b1847017da5e05d039e3bcc0 squid-2.4.STABLE7-1.21as.5.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5
src.rpm
63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm
ia64:
c3a025c8b1847017da5e05d039e3bcc0 squid-2.4.STABLE7-1.21as.5.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/squid-2.4.STABLE7-1.21as.5
src.rpm
63b4267b6fb3c1345cb9dee4a979eee1 squid-2.4.STABLE7-1.21as.5.src.rpm
i386:
81505707ca33f4870a62382b88745bbc squid-2.4.STABLE7-1.21as.5.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src
rpm
ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm
i386:
25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm
ia64:
429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm
ppc:
e3f3bab5baefba94302135e61499683f squid-2.5.STABLE3-6.3E.8.ppc.rpm
s390:
0c97fc7f12ac29445de550ec866feb82 squid-2.5.STABLE3-6.3E.8.s390.rpm
s390x:
9a2a1b5c70a510695ee560fe55358228 squid-2.5.STABLE3-6.3E.8.s390x.rpm
x86_64:
c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/squid-2.5.STABLE3-6.3E.
8.src.rpm
ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm
i386:
25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm
x86_64:
c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src
rpm
ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm
i386:
25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm
ia64:
429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm
x86_64:
c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.8.src
rpm
ee14ff8dd48ea6e08c97dd4c2167550a squid-2.5.STABLE3-6.3E.8.src.rpm
i386:
25f9ca52f04b6571c9b29b2de47a82e4 squid-2.5.STABLE3-6.3E.8.i386.rpm
ia64:
429a13ef1b3e9dce3fe157cd3b6d1651 squid-2.5.STABLE3-6.3E.8.ia64.rpm
x86_64:
c2757abe79275c3b8ff61abb3a9c2406 squid-2.5.STABLE3-6.3E.8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE8-dns_assert
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0446
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
────────────────────────────────────────
-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.4
iQEVAwUBQigqAacyQYefg2/NAQGtAwgAlyWgQjudc3p4w/MF970rtXQBjAtX0/oU
SOoAxFbrXxn2Lc7jL4u/UAVYtFKbkPSUOChaH9oAGk7/tx3W2L4knlVdxbSrm/wB
xW/fQ0jcgE8ONonBokRhq7XjGKus+NFCA7+qQ756wQCKy7A+03Zs0FrvY5QAgH+C
8toUfSmaberHYlaJyr+3vzbR0/ccH4H94quiEZBwAVI6U4HwUBPZeTMRf1QjIKOn
QuWixxpXNScEiEO6/y9nLtAmRISKcM3nvgfezXHkvQSvVEhJic7lbkAv7epA+RrS
LNagoelMUGPEz4PuH/k6g2u6aieqAcFY3OExLgNVc+sKjmljqylynA==
=jK+y
-----END PGP SIGNATURE-----
--
Taiwan Computer Emergency Response Team Security Advisory mailing list.
Mail to : Majordomo@cert.org.tw and include a line "subscribe advisory".
Please visit http://www.cert.org.tw/.
PGP key : http://www.cert.org.tw/eng/pgp.htm
NetSecurity 近期熱門文章
PTT數位生活區 即時熱門文章