發信人: tw-cert () 看板: security 日期: Mon Mar 18 19:29:25 2002 標題: TW-CA-2002-053-[HPSBTL0203-026: New squid packages availabl TW-CA-2002-053-[HPSBTL0203-026: New squid packages available] ------------------------------------------------------------------------------- TWCERT發布日期: 2002/03/15 原漏洞發布日期: 2002/03/02 分類: Info Leak 來源參考: SecurityFocus Advisories ------ 簡述 ------------------------------------------------------------------- 在 Squid 套件中存在記憶體洩漏(Memory leak)、URL 語法攻擊(URL parsing crash)和啟 動錯誤(activation errors)的問題。 ------ 說明 ------------------------------------------------------------------- Squid 是一高效能的代理伺服器。截至目前為止已經在 Squid 上找到許多問題,包括版本 2.4.STABLE2。 這些問題包括: (1)在 SNMP 程式碼中的記憶體漏洞(memory leak)。 (2)在 FTP URL 語法上的一種特殊格式資料輸入的攻擊方式。 (3)即時從設定檔中關閉 HTCP 服務,它依然繼續提供服務。 升級的套件包括對 Squid 2.4.STABLE2 的支援。Linux 平台上的 HP Secure OS 軟體的預 設安裝並不會安裝 telnet server。 ------ 影響平台 --------------------------------------------------------------- 任何使用 HP Secure OS 1.0 軟體的Linux平台。 ------ 修正方式 --------------------------------------------------------------- 安裝適當的 RPM。 Hewlett-Packard 公司建議客戶至下列的 Red Hat Security Advisory 下載 RPMs: 2002-02-26 squid (RHSA-2002-029) New squid packages available http://www.redhat.com/support/errata/RHSA-2002-018.html 安裝步驟如下: 1.如果您有使用 tripwire 產品,HP 建議您先執行完整性檢查,並在安裝 security bulletin RPM 前修正任何的不正確設定。 tripwire --check --interactive 2.使用root帳號安裝 security bulletin RPM。 rpm -F 3.更新 tripwire 資料庫。 tripwire --check --interactive ------ 影響結果 --------------------------------------------------------------- 存在未經授權的指令會以root權限執行的潛在危機。 ------ 連絡 TW-CERT ----------------------------------------------------------- Tel: 886-7-5250211 Fax: 886-7-5250212 886-2-23563303 886-2-23924082 Email: twcert@cert.org.tw URL: http://www.cert.org.tw/ PGP key: http://www.cert.org.tw/eng/pgp.htm =============================================================================== 附件:[HPSBTL0203-026: New squid packages available] HPSBTL0203-026: New squid packages available Published: Mar 02, 2002 Updated: Mar 02, 2002 -------------------------------------------------------------------------------- Document ID: HPSBTL0203-026 Date Loaded: 20020228 Title: New squid packages available TEXT --------------------------------------------------------------- HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #026 Originally issued: 28 February '02 --------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any consequences to any customer resulting from the customer's failure to fully implement instructions in this Security Bulletin as soon as possible. Because the vulnerability does not require a Hewlett-Packard Secure OS 1.0 patch or re-packaging of the RPM affected by the bulletin, the RPMs have not been produced or tested by Hewlett-Packard. --------------------------------------------------------------- PROBLEM: Memory leak, URL parsing crash, and activation errors in Squid package PLATFORM: Any system running HP Secure OS software for Linux Release 1.0 DAMAGE: Resource issue due to memory leak. Possible denial of service due to FTP URL parsing code. HTCP service is active even if disabled in configuration file. SOLUTION: Apply the appropriate RPMs (see section B below) MANUAL ACTIONS: None AVAILABILITY: The RPMs are available now. --------------------------------------------------------------- A. Background Squid is a high-performance proxy caching server. Various issues have been found in Squid up to and including version 2.4.STABLE2. The issues include: - a memory leak in the SNMP code - a crash on specially-formatted data in FTP URL parsing - HTCP would still be active, even if it was disabled in the config file The updated pacakge contains Squid version 2.4.STABLE3. Squid is not included in the default installation of HP Secure OS Software for Linux Release 1.0. B. Fixing the problem Hewlett-Packard Company recommends that customers who have installed Squid download the RPMs listed in the following Red Hat Security Advisory: 2002-02-26 squid (RHSA-2002-029) New squid packages available http://www.redhat.com/support/errata/RHSA-2002-018.html To install the security bulletin RPMs, use the following sequence of commands: 1. If you use the tripwire product, we recommend that you run a a consistency check and fix any violations before installing the security bulletin RPM. tripwire --check --interactive 2. Install the bulletin RPM from the root account. rpm -F 3. Update the tripwire database tripwire --check --interactive NOTE: The rpm -q command can be used to determine if the package is installed. Hewlett-Packard recommends applying the security bulletin fixes to installed packages only. The -F option to the RPM installer will only apply the fix if the package is currently installed on the system. Dependent RPMs can be found by using the "Find Latest RPMs" search facility at http://www.redhat.com/apps/download. To find the latest dependent RPM enter the RPM's name in the "By Keyword" box. C. To subscribe to automatically receive future HP Security Bulletins from the HP IT Resource Center via electronic mail, do the following: Use your browser to access the HP IT Resource Center page at: http://itrc.hp.com Use the 'Login' tab at the left side of the screen to login using your ID and password. Use your existing login or the "Register" button at the left to create a login. Remember to save the User ID assigned to you, and your password. This login provides access to many useful areas of the ITRC. In the left most frame select "Maintenance and Support". Under the "Notifications" section (near the bottom of the page), select "Support Information Digests". To -subscribe- to future HP Security Bulletins or other Technical Digests, click the check box (in the left column) for the appropriate digest and then click the "Update Subscriptions" button at the bottom of the page. or To -review- bulletins already released, select the link (in the middle column) for the appropriate digest. D. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server. You may also get the security-alert PGP key by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Permission is granted for copying and circulating this bulletin to Hewlett-Packard (HP)customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. --------------------------------------------------------------- -----End of Document ID: HPSBTL0203-026-------------------------------------- -- * Origin: 中山大學-美麗之島BBS * From: 140.117.101.140 [已通過認證] .