ID CVE-2007-0248
Summary The aclMatchExternal function in Squid before 2.6.STABLE7 allows remote attackers to cause a denial of service (crash) by causing an external_acl queue overload, which triggers an infinite loop.
References
Vulnerable Configurations
  • cpe:2.3:a:squid:squid:2.6.stable6
    cpe:2.3:a:squid:squid:2.6.stable6
CVSS
Base: 5.0 (as of 16-01-2007 - 14:52)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200701-22.NASL
    description The remote host is affected by the vulnerability described in GLSA-200701-22 (Squid: Multiple Denial of Service vulnerabilities) Squid fails to correctly handle ftp:// URI's. There is also an error in the external_acl queue which can cause an infinite looping condition. Impact : An attacker could attempt to retrieve a specially crafted URI via a Squid server causing the service to crash. If an attacker could generate a sufficiently high load on the Squid services, they could cause a Denial of Service by forcing Squid into an infinite loop. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 24258
    published 2007-01-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24258
    title GLSA-200701-22 : Squid: Multiple Denial of Service vulnerabilities
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2007-026.NASL
    description A vulnerability in squid was discovered that could be remotely exploited by using a special ftp:// URL (CVE-2007-0247). Another Denial of Service vulnerability was discovered in squid 2.6 that allows remote attackers to crash the server by causing an external_acl_queue overload (CVE-2007-0248). Additionally, a bug in squid 2.6 for max_user_ip handling in ntlm_auth has been corrected. The updated packages have been patched to correct this problem.
    last seen 2019-02-21
    modified 2018-12-05
    plugin id 24640
    published 2007-02-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24640
    title Mandrake Linux Security Advisory : squid (MDKSA-2007:026)
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_11402.NASL
    description - This update fixes a remotely exploitable denial-of-service bug in squid, that can be triggered by using special ftp:// URLs. (CVE-2007-0247) - The packages are not vulnerable to a bug in external ACLs. (CVE-2007-0248)
    last seen 2019-02-21
    modified 2012-04-23
    plugin id 41115
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41115
    title SuSE9 Security Update : squid (YOU Patch Number 11402)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-414-1.NASL
    description David Duncan Ross Palmer and Henrik Nordstrom discovered that squid incorrectly handled special characters in FTP URLs. Remote users with access to squid could crash the server leading to a denial of service. (CVE-2007-0247) Erick Dantas Rotole and Henrik Nordstrom discovered that squid could end up in an endless loop when exhausted of available external ACL helpers. Remote users with access to squid could cause CPU starvation, possibly leading to a denial of service. This does not affect a default Ubuntu installation, since external ACL helpers must be configured and used. (CVE-2007-0248). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 28003
    published 2007-11-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=28003
    title Ubuntu 6.06 LTS / 6.10 : squid vulnerabilities (USN-414-1)
  • NASL family Firewalls
    NASL id SQUID_CDOS.NASL
    description Two vulnerabilities have been reported in Squid, which can be exploited by malicious people to cause a denial of service.
    last seen 2019-02-21
    modified 2018-07-30
    plugin id 24870
    published 2007-03-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24870
    title Squid < 2.6.STABLE7 Multiple Remote DoS
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SQUID-2504.NASL
    description This update fixes a remotely exploitable denial-of-service bug in squid, that can be triggered by using special ftp:// URLs. (CVE-2007-0247) Additionally the 10.2 package needed a fix for another DoS bug (CVE-2007-0248) and for max_user_ip handling in ntlm_auth.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27452
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27452
    title openSUSE 10 Security Update : squid (squid-2504)
refmap via4
bid 22203
confirm
gentoo GLSA-200701-22
mandriva MDKSA-2007:026
secunia
  • 23767
  • 23805
  • 23889
  • 23921
  • 23946
suse SUSE-SA:2007:012
ubuntu USN-414-1
vupen ADV-2007-0199
xf squid-externalacl-dos(31525)
statements via4
contributor Mark J Cox
lastmodified 2007-07-26
organization Red Hat
statement Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. This issue did not affect the versions of Squid as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
Last major update 07-03-2011 - 21:49
Published 16-01-2007 - 13:28
Last modified 28-07-2017 - 21:30
Back to Top