Upstream information

CVE-2005-1519 at MITRE

Description

Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.4
Vector AV:N/AC:L/Au:N/C:N/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 83509 [RESOLVED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SuSE Linux 8.2 for IA32
  • squid >= 2.5.STABLE1-112
SuSE Linux 9.0 for AMD64
SuSE Linux 9.0 for IA32
  • squid >= 2.5.STABLE3-124
SUSE LINUX 9.1 for IA32
SUSE LINUX 9.1 for x86-64
  • squid >= 2.5.STABLE5-42.38
SUSE LINUX 9.2
  • squid >= 2.5.STABLE6-6.13
SUSE LINUX 9.3
  • squid >= 2.5.STABLE9-4.2
SUSE LINUX Retail Solution 8
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • squid >= 2.4.STABLE7-295
slox4,2.x86
core9.ppc
core9.x86
core9.s390
core9.ia64
YOU Patch Nr: 10275
Open Enterprise Server
  • squid >= 2.5.STABLE5-42.38
slox4,2.x86
core9.ppc
core9.x86
core9.s390
core9.ia64
YOU Patch Nr: 10275