Squid Analysis Report Generator <= 2.2.3.1 buffer overflow

2010.01.02
Credit: L4teral
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

====================================================================== Squid Analysis Report Generator <= 2.2.3.1 buffer overflow ====================================================================== Author: L4teral <l4teral [4t] gmail com> Impact: buffer overflow Status: fixed version available ------------------------------ Affected software description: ------------------------------ Application: Squid Analysis Report Generator Version: <= 2.2.3.1 Vendor: http://sarg.sourceforge.net Description: Squid Analysis Report Generator is a tool that allow you to view "where" your users are going to on the Internet. -------------- Vulnerability: -------------- Execution of arbitrary code is possible by executing sarg with specially crafted squid log files (access and useragent log). The access.log has to be manually created to trigger the exploit, as squid will not allow malformed HTTP methods. The useragent log is more critical, as this vulnerability can be exploited by just passing the useragent string within a request to the squid proxy. ------------ PoC/Exploit: ------------ Edit a normal access log and set the request method to an overly long string. Edit a normal useragent log and set the useragent field to an overly long string or send a request to the Squid proxy server passing an overly long string as useragent in the HTTP header. --------- Solution: --------- Upgrade to version 2.2.4 or higher. --------- Timeline: --------- 2008-01-28 - vendor informed 2008-01-28 - vendor responded 2008-03-02 - vendor released new version 2008-03-03 - public disclosure

References:

http://www.vupen.com/english/advisories/2008/0749
http://www.securityfocus.com/archive/1/archive/1/489018/100/0/threaded
http://sourceforge.net/project/shownotes.php?release_id=581212


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top