var-200903-0332
Vulnerability from variot
Squid, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header. HTTP of Host A transparent proxy server that relays the connection destination based on the header value may be exploited by an attacker. HTTP of Host Header is RFC 2616 Multiple web sites on a web server IP Used to enable address sharing. The transparent proxy server relays the network connection regardless of the browser settings. Some transparent proxy servers Host Some of them determine the connection destination based on the header value. Flash And Java Browser plug-ins such as these restrict communication by dynamic content executed on the browser to only the site or domain where the content was placed. Attackers use dynamic content, HTTP Host You can craft header values. The proxy server Host When making a decision based on the value of the header, the attacker Host By crafting the header, you can connect to any site. Attackers conduct attacks by directing users to sites with malicious dynamic content or by embedding malicious dynamic content in sites that they believe can be trusted. This issue only affects transparent proxy servers. In addition, browser Same Origin Policy Authentication information by attackers (cookie Such ) Reuse of is considered impossible.An attacker could access websites and resources that can be reached from the proxy. These sites may also include internal resources located on the intranet. Attackers may exploit this issue to obtain sensitive information such as internal intranet webpages. Additional attacks may also be possible.
SOLUTION: As a workaround, the vendor recommends to "configure Guardian to block their internal web servers without passwords using hostname and IPaddress". - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201309-22
http://security.gentoo.org/
Severity: Normal Title: Squid: Multiple vulnerabilities Date: September 27, 2013 Bugs: #261208, #389133, #447596, #452584, #461492, #476562, #476960 ID: 201309-22
Synopsis
Multiple vulnerabilities have been found in Squid, possibly resulting in remote Denial of Service.
Background
Squid is a full-featured web proxy cache.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-proxy/squid < 3.2.13 >= 3.2.13
Description
Multiple vulnerabilities have been discovered in Squid. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker may be able to bypass ACL restrictions or cause a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All Squid users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-proxy/squid-3.2.13"
References
[ 1 ] CVE-2009-0801 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0801 [ 2 ] CVE-2011-4096 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4096 [ 3 ] CVE-2012-5643 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5643 [ 4 ] CVE-2013-0189 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0189 [ 5 ] CVE-2013-1839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1839 [ 6 ] CVE-2013-4115 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4115 [ 7 ] CVE-2013-4123 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4123
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201309-22.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . ----------------------------------------------------------------------
Did you know? Our assessment and impact rating along with detailed information such as exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list?
Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/
Click here to trial our solutions: http://secunia.com/advisories/try_vi/
TITLE: Ziproxy HTTP "Host:" Header Security Bypass
SECUNIA ADVISORY ID: SA34018
VERIFY ADVISORY: http://secunia.com/advisories/34018/
DESCRIPTION: A security issue has been reported in Ziproxy, which can be exploited by malicious people to bypass certain security restrictions. This can be exploited to e.g. access restricted websites or bypass a browser's security context protection mechanism by sending HTTP requests with a forged HTTP "Host:" header. via active content).
The security issue is reported in version 2.6.0. Other versions may also be affected.
SOLUTION: The vendor recommends to use a proxy server with better security capabilities between clients and Ziproxy. Use a firewall to restrict access to untrusted websites.
PROVIDED AND/OR DISCOVERED BY: US-CERT credits Robert Auger, PayPal Information Risk Management team.
ORIGINAL ADVISORY: US-CERT VU#435052: http://www.kb.cert.org/vuls/id/435052
http://www.kb.cert.org/vuls/id/MAPG-7N9GN8
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
SOLUTION: The vendor has published workarounds
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200903-0332", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web proxy cache", "scope": "eq", "trust": 1.9, "vendor": "squid", "version": "2.7" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.6, "vendor": "squid", "version": "3.0_stable2" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.6, "vendor": "squid", "version": "2.7.stable5" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.6, "vendor": "squid", "version": "3.0_stable1" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.6, "vendor": "squid", "version": "3.0_stable5" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.6, "vendor": "squid", "version": "3.0_stable3" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.6, "vendor": "squid", "version": "3.0_stable13" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.6, "vendor": "squid", "version": "3.0_stable12" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.6, "vendor": "squid", "version": "2.7.stable6" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.6, "vendor": "squid", "version": "3.0_stable4" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.3, "vendor": "squid", "version": "3.0" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.0, "vendor": "squid", "version": "3.0_stable6" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.0, "vendor": "squid", "version": "3.0_pre3" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.0, "vendor": "squid", "version": "3.0_pre1" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.0, "vendor": "squid", "version": "3.0_stable7" }, { "model": "web proxy cache", "scope": "eq", "trust": 1.0, "vendor": "squid", "version": "3.0_pre2" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "astaro", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet initiative", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "qbik new zealand", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "smoothwall", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "squid", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ziproxy", "version": null }, { "model": "squid", "scope": "eq", "trust": 0.8, "vendor": "squid cache", "version": "1.x to 3.1" }, { "model": "squid", "scope": "eq", "trust": 0.8, "vendor": "squid cache", "version": "3.2 to 3.2.0.10" }, { "model": "seil/b1", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "1.00 ~ 2.20" }, { "model": "seil/plus", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "1.83 ~ 2.00" }, { "model": "seil/turbo", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "1.83 ~ 2.00" }, { "model": "seil/x1,x2", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "1.00 ~ 2.20" }, { "model": "ziproxy", "scope": "eq", "trust": 0.3, "vendor": "ziproxy", "version": "2.6" }, { "model": "mac orchard dansguardian", "scope": "eq", "trust": 0.3, "vendor": "the", "version": "0" }, { "model": "web proxy cache pre3", "scope": "eq", "trust": 0.3, "vendor": "squid", "version": "3.0" }, { "model": "web proxy cache pre2", "scope": "eq", "trust": 0.3, "vendor": "squid", "version": "3.0" }, { "model": "web proxy cache pre1", "scope": "eq", "trust": 0.3, "vendor": "squid", "version": "3.0" }, { "model": "web proxy cache 3.0.stable7", "scope": null, "trust": 0.3, "vendor": "squid", "version": null }, { "model": "web proxy cache 3.0.stable6", "scope": null, "trust": 0.3, "vendor": "squid", "version": null }, { "model": "web proxy cache 3.0.stable5", "scope": null, "trust": 0.3, "vendor": "squid", "version": null }, { "model": "web proxy cache 3.0.stable4", "scope": null, "trust": 0.3, "vendor": "squid", "version": null }, { "model": "web proxy cache 3.0.stable3", "scope": null, "trust": 0.3, "vendor": "squid", "version": null }, { "model": "web proxy cache 3.0.stable2", "scope": null, "trust": 0.3, "vendor": "squid", "version": null }, { "model": "web proxy cache 3.0.stable13", "scope": null, "trust": 0.3, "vendor": "squid", "version": null }, { "model": "web proxy cache 3.0.stable12", "scope": null, "trust": 0.3, "vendor": "squid", "version": null }, { "model": "web proxy cache 3.0.stable1", "scope": null, "trust": 0.3, "vendor": "squid", "version": null }, { "model": "web proxy cache 2.7.stable6", "scope": null, "trust": 0.3, "vendor": "squid", "version": null }, { "model": "web proxy cache 2.7.stable5", "scope": null, "trust": 0.3, "vendor": "squid", "version": null }, { "model": "smoothguardian", "scope": "eq", "trust": 0.3, "vendor": "smoothwall", "version": "2008" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.5.2" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.2.2" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.2.1" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.1.4.1099" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.1.3.1096" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.1.2.1094" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.1.1.1077" }, { "model": "wingate build", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.31005" }, { "model": "wingate build", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.21001" }, { "model": "wingate build", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.21000" }, { "model": "wingate build", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.1995" }, { "model": "wingate build", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.1993" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.0" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.2" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "utm", "scope": "eq", "trust": 0.3, "vendor": "funkwerk", "version": "0" }, { "model": "coat systems proxysg", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "0" }, { "model": "bloxx", "scope": "eq", "trust": 0.3, "vendor": "bloxx", "version": "0" }, { "model": "security gateway", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "7.404" }, { "model": "security gateway", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "7.402" }, { "model": "security gateway", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "7.302" }, { "model": "security gateway", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "7.301" }, { "model": "security gateway", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "7.3" }, { "model": "security gateway", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "7.006" }, { "model": "security gateway", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "7.005" }, { "model": "security gateway", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "7" }, { "model": "ziproxy", "scope": "ne", "trust": 0.3, "vendor": "ziproxy", "version": "2.7" }, { "model": "mac orchard dansguardian", "scope": "ne", "trust": 0.3, "vendor": "the", "version": "2.10.1.1" }, { "model": "utm", "scope": "ne", "trust": 0.3, "vendor": "funkwerk", "version": "1.95.1" } ], "sources": [ { "db": "CERT/CC", "id": "VU#435052" }, { "db": "BID", "id": "33858" }, { "db": "JVNDB", "id": "JVNDB-2009-001094" }, { "db": "CNNVD", "id": "CNNVD-200903-067" }, { "db": "NVD", "id": "CVE-2009-0801" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:squid-cache:squid", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001094" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Robert Auger from the PayPal Information Risk Management team", "sources": [ { "db": "BID", "id": "33858" }, { "db": "CNNVD", "id": "CNNVD-200903-067" } ], "trust": 0.9 }, "cve": "CVE-2009-0801", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CVE-2009-0801", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:H/Au:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2009-0801", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#435052", "trust": 0.8, "value": "3.54" }, { "author": "NVD", "id": "CVE-2009-0801", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200903-067", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2009-0801", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#435052" }, { "db": "VULMON", "id": "CVE-2009-0801" }, { "db": "JVNDB", "id": "JVNDB-2009-001094" }, { "db": "CNNVD", "id": "CNNVD-200903-067" }, { "db": "NVD", "id": "CVE-2009-0801" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Squid, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header. HTTP of Host A transparent proxy server that relays the connection destination based on the header value may be exploited by an attacker. HTTP of Host Header is RFC 2616 Multiple web sites on a web server IP Used to enable address sharing. The transparent proxy server relays the network connection regardless of the browser settings. Some transparent proxy servers Host Some of them determine the connection destination based on the header value. Flash And Java Browser plug-ins such as these restrict communication by dynamic content executed on the browser to only the site or domain where the content was placed. Attackers use dynamic content, HTTP Host You can craft header values. The proxy server Host When making a decision based on the value of the header, the attacker Host By crafting the header, you can connect to any site. Attackers conduct attacks by directing users to sites with malicious dynamic content or by embedding malicious dynamic content in sites that they believe can be trusted. This issue only affects transparent proxy servers. In addition, browser Same Origin Policy Authentication information by attackers (cookie Such ) Reuse of is considered impossible.An attacker could access websites and resources that can be reached from the proxy. These sites may also include internal resources located on the intranet. \nAttackers may exploit this issue to obtain sensitive information such as internal intranet webpages. Additional attacks may also be possible. \n\nSOLUTION:\nAs a workaround, the vendor recommends to \"configure Guardian to\nblock their internal web servers without passwords using hostname and\nIPaddress\". - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201309-22\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Squid: Multiple vulnerabilities\n Date: September 27, 2013\n Bugs: #261208, #389133, #447596, #452584, #461492, #476562, #476960\n ID: 201309-22\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Squid, possibly resulting\nin remote Denial of Service. \n\nBackground\n==========\n\nSquid is a full-featured web proxy cache. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-proxy/squid \u003c 3.2.13 \u003e= 3.2.13\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Squid. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker may be able to bypass ACL restrictions or cause a\nDenial of Service condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Squid users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-proxy/squid-3.2.13\"\n\nReferences\n==========\n\n[ 1 ] CVE-2009-0801\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0801\n[ 2 ] CVE-2011-4096\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4096\n[ 3 ] CVE-2012-5643\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5643\n[ 4 ] CVE-2013-0189\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0189\n[ 5 ] CVE-2013-1839\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1839\n[ 6 ] CVE-2013-4115\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4115\n[ 7 ] CVE-2013-4123\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4123\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201309-22.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. ----------------------------------------------------------------------\n\nDid you know? Our assessment and impact rating along with detailed\ninformation such as exploit code availability, or if an updated patch\nis released by the vendor, is not part of this mailing-list?\n \nClick here to learn more about our commercial solutions:\nhttp://secunia.com/advisories/business_solutions/\n \nClick here to trial our solutions:\nhttp://secunia.com/advisories/try_vi/\n\n----------------------------------------------------------------------\n\nTITLE:\nZiproxy HTTP \"Host:\" Header Security Bypass\n\nSECUNIA ADVISORY ID:\nSA34018\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34018/\n\nDESCRIPTION:\nA security issue has been reported in Ziproxy, which can be exploited\nby malicious people to bypass certain security restrictions. This can be\nexploited to e.g. access restricted websites or bypass a browser\u0027s\nsecurity context protection mechanism by sending HTTP requests with a\nforged HTTP \"Host:\" header. via active content). \n\nThe security issue is reported in version 2.6.0. Other versions may\nalso be affected. \n\nSOLUTION:\nThe vendor recommends to use a proxy server with better security\ncapabilities between clients and Ziproxy. Use a firewall to restrict\naccess to untrusted websites. \n\nPROVIDED AND/OR DISCOVERED BY:\nUS-CERT credits Robert Auger, PayPal Information Risk Management\nteam. \n\nORIGINAL ADVISORY:\nUS-CERT VU#435052:\nhttp://www.kb.cert.org/vuls/id/435052\n\nhttp://www.kb.cert.org/vuls/id/MAPG-7N9GN8\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nSOLUTION:\nThe vendor has published workarounds", "sources": [ { "db": "NVD", "id": "CVE-2009-0801" }, { "db": "CERT/CC", "id": "VU#435052" }, { "db": "JVNDB", "id": "JVNDB-2009-001094" }, { "db": "BID", "id": "33858" }, { "db": "VULMON", "id": "CVE-2009-0801" }, { "db": "PACKETSTORM", "id": "75119" }, { "db": "PACKETSTORM", "id": "123423" }, { "db": "PACKETSTORM", "id": "75100" }, { "db": "PACKETSTORM", "id": "75126" }, { "db": "PACKETSTORM", "id": "75099" }, { "db": "PACKETSTORM", "id": "75373" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#435052", "trust": 4.1 }, { "db": "NVD", "id": "CVE-2009-0801", "trust": 2.9 }, { "db": "BID", "id": "33858", "trust": 2.8 }, { "db": "SECUNIA", "id": "34019", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2009-0500", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2009-001094", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200903-067", "trust": 0.6 }, { "db": "SECUNIA", "id": "34014", "trust": 0.2 }, { "db": "SECUNIA", "id": "34020", "trust": 0.2 }, { "db": "SECUNIA", "id": "34018", "trust": 0.2 }, { "db": "SECUNIA", "id": "34064", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2009-0801", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "75119", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "123423", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "75100", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "75126", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "75099", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "75373", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#435052" }, { "db": "VULMON", "id": "CVE-2009-0801" }, { "db": "BID", "id": "33858" }, { "db": "JVNDB", "id": "JVNDB-2009-001094" }, { "db": "PACKETSTORM", "id": "75119" }, { "db": "PACKETSTORM", "id": "123423" }, { "db": "PACKETSTORM", "id": "75100" }, { "db": "PACKETSTORM", "id": "75126" }, { "db": "PACKETSTORM", "id": "75099" }, { "db": "PACKETSTORM", "id": "75373" }, { "db": "CNNVD", "id": "CNNVD-200903-067" }, { "db": "NVD", "id": "CVE-2009-0801" } ] }, "id": "VAR-200903-0332", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.19642857 }, "last_update_date": "2024-11-23T21:30:33.036000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u900f\u904e\u578bHTTP\u30d7\u30ed\u30ad\u30b7\u30b5\u30fc\u30d0\u306b\u304a\u3051\u308b\u30cf\u30f3\u30c9\u30aa\u30d5\u6a5f\u80fd\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "http://www.seil.jp/seilseries/security/2009/04091698.php" }, { "title": "SQUID-2011:1", "trust": 0.8, "url": "http://www.squid-cache.org/Advisories/SQUID-2011_1.txt" }, { "title": "3.2.0.11", "trust": 0.8, "url": "http://www.squid-cache.org/Versions/v3/3.2/RELEASENOTES.html" }, { "title": "3.1.15", "trust": 0.8, "url": "http://www.squid-cache.org/Versions/v3/3.1/RELEASENOTES.html#ss1.1" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.squid-cache.org/" }, { "title": "Debian CVElist Bug Report Logs: CVE-2009-0801: HTTP Host Header Incorrect Relay Behavior Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=f9283cbfd0cedb791a3109b7b4a06782" }, { "title": "", "trust": 0.1, "url": "https://github.com/newtonjp/redsocks " }, { "title": "redsocks_for_mipsel", "trust": 0.1, "url": "https://github.com/SuzukiHonoka/redsocks_for_mipsel " }, { "title": "squid-in-a-can", "trust": 0.1, "url": "https://github.com/jpetazzo/squid-in-a-can " }, { "title": "docker-squid", "trust": 0.1, "url": "https://github.com/pires/docker-squid " }, { "title": "redsocks", "trust": 0.1, "url": "https://github.com/darkk/redsocks " } ], "sources": [ { "db": "VULMON", "id": "CVE-2009-0801" }, { "db": "JVNDB", "id": "JVNDB-2009-001094" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001094" }, { "db": "NVD", "id": "CVE-2009-0801" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://www.kb.cert.org/vuls/id/435052" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/33858" }, { "trust": 0.9, "url": "http://secunia.com/advisories/34019/" }, { "trust": 0.8, "url": "http://www.thesecuritypractice.com/the_security_practice/transparentproxyabuse.pdf" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc2616.txt" }, { "trust": 0.8, "url": "http://www.webappsec.org/lists/websecurity/archive/2008-06/msg00073.html" }, { "trust": 0.8, "url": "http://www.us-cert.gov/reading_room/securing_browser/" }, { "trust": 0.8, "url": "http://kb.adobe.com/selfservice/viewcontent.do?externalid=tn_14213" }, { "trust": 0.8, "url": "http://www.w3.org/protocols/rfc2616/rfc2616-sec9.html" }, { "trust": 0.8, "url": "http://www.owasp.org/index.php/testing_for_http_methods_and_xst_(owasp-cm-008)#black_box_testing_and_example" }, { "trust": 0.8, "url": "http://en.wikipedia.org/w/index.php?title=list_of_tcp_and_udp_port_numbers\u0026oldid=266934839" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0801" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu435052/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0801" }, { "trust": 0.8, "url": "http://www.vupen.com/english/advisories/2009/0500" }, { "trust": 0.5, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.5, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.5, "url": "http://secunia.com/advisories/try_vi/" }, { "trust": 0.5, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.5, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.4, "url": "https://hypersonic.bluecoat.com/support/securityadvisories/proxysg_in_transparent_deployments" }, { "trust": 0.3, "url": "http://www.cgisecurity.com/2009/07/more-products-identified-using-vulnerable-transparent-proxy-architecture.html" }, { "trust": 0.3, "url": "http://www.smoothwall.net/products/smoothguardian2008/" }, { "trust": 0.3, "url": "http://www.thesecuritypractice.com/the_security_practice/2009/03/socket-capable-browser-plugins-result-in-transparent-proxy-abuse.html" }, { "trust": 0.3, "url": "http://www.squid-cache.org/" }, { "trust": 0.3, "url": "http://www.wingate.com/" }, { "trust": 0.3, "url": "http://ziproxy.sourceforge.net/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/264.html" }, { "trust": 0.1, "url": "https://github.com/newtonjp/redsocks" }, { "trust": 0.1, "url": "https://github.com/suzukihonoka/redsocks_for_mipsel" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=45097" }, { "trust": 0.1, "url": "http://secunia.com/advisories/34014/" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/mapg-7m6sm7" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1839" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0189" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4115" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4123" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4096" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5643" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201309-22.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0189" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1839" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4123" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0801" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4115" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0801" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4096" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5643" }, { "trust": 0.1, "url": "http://secunia.com/advisories/34020/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/34018/" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/mapg-7n9gn8" }, { "trust": 0.1, "url": "http://secunia.com/advisories/34064/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#435052" }, { "db": "VULMON", "id": "CVE-2009-0801" }, { "db": "BID", "id": "33858" }, { "db": "JVNDB", "id": "JVNDB-2009-001094" }, { "db": "PACKETSTORM", "id": "75119" }, { "db": "PACKETSTORM", "id": "123423" }, { "db": "PACKETSTORM", "id": "75100" }, { "db": "PACKETSTORM", "id": "75126" }, { "db": "PACKETSTORM", "id": "75099" }, { "db": "PACKETSTORM", "id": "75373" }, { "db": "CNNVD", "id": "CNNVD-200903-067" }, { "db": "NVD", "id": "CVE-2009-0801" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#435052" }, { "db": "VULMON", "id": "CVE-2009-0801" }, { "db": "BID", "id": "33858" }, { "db": "JVNDB", "id": "JVNDB-2009-001094" }, { "db": "PACKETSTORM", "id": "75119" }, { "db": "PACKETSTORM", "id": "123423" }, { "db": "PACKETSTORM", "id": "75100" }, { "db": "PACKETSTORM", "id": "75126" }, { "db": "PACKETSTORM", "id": "75099" }, { "db": "PACKETSTORM", "id": "75373" }, { "db": "CNNVD", "id": "CNNVD-200903-067" }, { "db": "NVD", "id": "CVE-2009-0801" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-02-23T00:00:00", "db": "CERT/CC", "id": "VU#435052" }, { "date": "2009-03-04T00:00:00", "db": "VULMON", "id": "CVE-2009-0801" }, { "date": "2009-02-23T00:00:00", "db": "BID", "id": "33858" }, { "date": "2009-03-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001094" }, { "date": "2009-02-23T14:11:04", "db": "PACKETSTORM", "id": "75119" }, { "date": "2013-09-27T22:24:58", "db": "PACKETSTORM", "id": "123423" }, { "date": "2009-02-23T12:27:14", "db": "PACKETSTORM", "id": "75100" }, { "date": "2009-02-24T15:54:02", "db": "PACKETSTORM", "id": "75126" }, { "date": "2009-02-23T12:27:11", "db": "PACKETSTORM", "id": "75099" }, { "date": "2009-03-04T15:05:53", "db": "PACKETSTORM", "id": "75373" }, { "date": "2009-03-04T00:00:00", "db": "CNNVD", "id": "CNNVD-200903-067" }, { "date": "2009-03-04T16:30:00.170000", "db": "NVD", "id": "CVE-2009-0801" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-09-28T00:00:00", "db": "CERT/CC", "id": "VU#435052" }, { "date": "2009-06-18T00:00:00", "db": "VULMON", "id": "CVE-2009-0801" }, { "date": "2013-09-28T00:16:00", "db": "BID", "id": "33858" }, { "date": "2011-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001094" }, { "date": "2009-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200903-067" }, { "date": "2024-11-21T01:00:56.707000", "db": "NVD", "id": "CVE-2009-0801" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "123423" }, { "db": "CNNVD", "id": "CNNVD-200903-067" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intercepting proxy servers may incorrectly rely on HTTP headers to make connections", "sources": [ { "db": "CERT/CC", "id": "VU#435052" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-200903-067" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.