Thread-topic: [SA17271] Squid FTP Server Response Handling Denial of Service
>
>
> TITLE:
> Squid FTP Server Response Handling Denial of Service
>
> SECUNIA ADVISORY ID:
> SA17271
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/17271/
>
> CRITICAL:
> Less critical
>
> IMPACT:
> DoS
>
> WHERE:
> From remote
>
> SOFTWARE:
> Squid 2.x
> http://secunia.com/product/310/
>
> DESCRIPTION:
> M.A.Young has reported a vulnerability in Squid, which can be
> exploited by malicious people to cause a DoS (Denial of Service).
>
> The vulnerability is caused due to an error in handling certain FTP
> server responses. This can be exploited to crash Squid by visiting a
> malicious FTP server via the proxy.
>
> The vulnerability has been reported in Squid-2.5 and prior.
>
> SOLUTION:
> Apply patch for 2.5.STABLE11:
> http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STAB
> LE11-rfc1738_do_escape.patch
>
> PROVIDED AND/OR DISCOVERED BY:
> M.A.Young
>
> ORIGINAL ADVISORY:
> http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STA
> BLE11-rfc1738_do_escape
>