From owner-freebsd-ports-bugs@FreeBSD.ORG Sat Jun 28 12:50:02 2008
Return-Path:
Delivered-To: freebsd-ports-bugs@hub.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34])
by hub.freebsd.org (Postfix) with ESMTP id 6966F106567E
for ;
Sat, 28 Jun 2008 12:50:02 +0000 (UTC)
(envelope-from gnats@FreeBSD.org)
Received: from freefall.freebsd.org (freefall.freebsd.org
[IPv6:2001:4f8:fff6::28])
by mx1.freebsd.org (Postfix) with ESMTP id 38CA08FC1A
for ;
Sat, 28 Jun 2008 12:50:02 +0000 (UTC)
(envelope-from gnats@FreeBSD.org)
Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1])
by freefall.freebsd.org (8.14.2/8.14.2) with ESMTP id m5SCo2DW087359
for ;
Sat, 28 Jun 2008 12:50:02 GMT
(envelope-from gnats@freefall.freebsd.org)
Received: (from gnats@localhost)
by freefall.freebsd.org (8.14.2/8.14.1/Submit) id m5SCo29L087358;
Sat, 28 Jun 2008 12:50:02 GMT (envelope-from gnats)
Resent-Date: Sat, 28 Jun 2008 12:50:02 GMT
Resent-Message-Id: <200806281250.m5SCo29L087358@freefall.freebsd.org>
Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer)
Resent-To: freebsd-ports-bugs@FreeBSD.org
Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org,
Thomas-Martin Seck
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34])
by hub.freebsd.org (Postfix) with ESMTP id 689181065688
for ;
Sat, 28 Jun 2008 12:49:17 +0000 (UTC)
(envelope-from tmseck@netcologne.de)
Received: from smtp4.netcologne.de (smtp4.netcologne.de [194.8.194.137])
by mx1.freebsd.org (Postfix) with ESMTP id E84908FC16
for ;
Sat, 28 Jun 2008 12:49:16 +0000 (UTC)
(envelope-from tmseck@netcologne.de)
Received: from laurel.tmseck.homedns.org (xdsl-84-44-231-31.netcologne.de
[84.44.231.31])
by smtp4.netcologne.de (Postfix) with SMTP id 0631CDA62C
for ;
Sat, 28 Jun 2008 14:49:14 +0200 (CEST)
Received: (qmail 745 invoked from network); 28 Jun 2008 12:49:15 -0000
Received: from unknown (HELO hardy.tmseck.homedns.org) (192.168.1.2)
by 0 with SMTP; 28 Jun 2008 12:49:15 -0000
Received: from hardy.tmseck.homedns.org (localhost [127.0.0.1])
by hardy.tmseck.homedns.org (8.14.2/8.14.2) with ESMTP id
m5SCnDWB003013; Sat, 28 Jun 2008 14:49:13 +0200 (CEST)
(envelope-from tmseck@netcologne.de)
Received: (from thomas@localhost)
by hardy.tmseck.homedns.org (8.14.2/8.14.2/Submit) id m5SCnCXQ003012;
Sat, 28 Jun 2008 14:49:12 +0200 (CEST)
(envelope-from tmseck@netcologne.de)
Message-Id: <200806281249.m5SCnCXQ003012@hardy.tmseck.homedns.org>
Date: Sat, 28 Jun 2008 14:49:12 +0200 (CEST)
From: Thomas-Martin Seck
To: FreeBSD-gnats-submit@FreeBSD.org
X-Send-Pr-Version: 3.113
Cc: ports-security@FreeBSD.org
Subject: ports/125076: [Maintainer] [security] www/squid30: update to
3.0.STABLE7, fix a DoS vulnerability in SNMP
X-BeenThere: freebsd-ports-bugs@freebsd.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Thomas-Martin Seck
List-Id: Ports bug reports
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Sat, 28 Jun 2008 12:50:02 -0000
>Number: 125076
>Category: ports
>Synopsis: [Maintainer] [security] www/squid30: update to 3.0.STABLE7, fix a DoS vulnerability in SNMP
>Confidential: no
>Severity: serious
>Priority: high
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: maintainer-update
>Submitter-Id: current-users
>Arrival-Date: Sat Jun 28 12:50:01 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Thomas-Martin Seck
>Release: FreeBSD 7.0-STABLE i386
>Organization:
a private site in Germany
>Environment:
FreeBSD ports collection as of June 28, 2008.
>Description:
- Update to Squid 3.0.STABLE7.
- Fix a DoS vulnerability in the SNMP query processing code.
This vulnerability is the same as described in vid
65e99f52-1c5f-11d9-bc4a-000c41e2cdad and I updated the VuXML entry
accordingly, see patch below.
SNMP is enabled by default in Squid-3 and in the FreeBSD port but must
be explicitly activated by setting 'snmp_port' to a nonzero value in
squid.conf.
The reason only Squid-3 is affected is that the fix for the original
issue was not backported from the Squid-2 tree to the Squid-3 tree back
then.
>How-To-Repeat:
>Fix:
Apply this patch to security/vuxml/vuln.xml:
--- vuln.xml.orig 2008-06-28 14:08:45.000000000 +0200
+++ vuln.xml 2008-06-28 14:44:02.000000000 +0200
@@ -33860,6 +33860,7 @@
squid
2.5.7
+ 3.0.03.0.7
@@ -33873,16 +33874,22 @@
explicitly enabled via "make config". As a workaround,
SNMP can be disabled by defining "snmp_port 0" in
squid.conf.
+ Squid security advisory SQUID-2008:1 explains that Squid-3 versions
+ up to and including Squid-3.0.STABLE6 are affected by this error,
+ too.