Upstream information

CVE-2005-2917 at MITRE

Description

Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entries: 117414, 129639 [RESOLVED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE LINUX 10.0
  • squid >= 2.5.STABLE10-5.2
SuSE Linux 9.0 for AMD64
SuSE Linux 9.0 for IA32
  • squid >= 2.5.STABLE3-128
SUSE LINUX 9.1 for IA32
SUSE LINUX 9.1 for x86-64
  • squid >= 2.5.STABLE5-42.44
SUSE LINUX 9.2
  • squid >= 2.5.STABLE6-6.17
SUSE LINUX 9.3
  • squid >= 2.5.STABLE9-4.6
SUSE LINUX Retail Solution 8
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • squid >= 2.4.STABLE7-299
core9.ppc
core9.s390
core9.ia64
sles9-nlpos.x86
slox4,2.x86
core9.x86-64
YOU Patch Nr: 10555
Open Enterprise Server
  • squid >= 2.5.STABLE5-42.44
core9.ppc
core9.s390
core9.ia64
sles9-nlpos.x86
slox4,2.x86
core9.x86-64
YOU Patch Nr: 10555