Squid Web Proxy Authentication Failure Vulnerability
----------------------------------------------------------------------------
----


SUMMARY

After decoding the base64 encoded "user:password" pair given by the 
client, squid doesn't strip out any '\n' or '\r' found in the resulting 
string. Given such a string, any external authenticator will receive two 
lines instead of one, and most probably send two results. Now, any 
subsequent authentification exchange will has its answer shifted by one. 
Therefore, a malicious user can gain access to sites he or she should not 
have access to.

DETAILS

Vulnerable systems:
National Science Foundation Squid Web Proxy 2.2
National Science Foundation Squid Web Proxy 2.1
National Science Foundation Squid Web Proxy 1.1
National Science Foundation Squid Web Proxy 1.0NOVM
National Science Foundation Squid Web Proxy 1.0

Non vulnerable systems:
National Science Foundation Squid Web Proxy 2.3.0

Squid has released a patch the fixes the mentioned vulnerability:

 
<http://squid.nlanr.net/Versions/v2/2.2/bugs/squid-2.2.stable5-newlines_in_a
uth.patch >
http://squid.nlanr.net/Versions/v2/2.2/bugs/squid-2.2.stable5-newlines_in_au
th.patch


ADDITIONAL INFORMATION

The vulnerability was discovered by:  <mailto:[EMAIL PROTECTED]> Oezguer 
Kesim



-------
AFLHI 058009990407128029/089802---(102598//991024)


    milis ini didukung oleh :
 >> http://www.indolinux.com - dunia linux indonesia
 -------------------------------------------------------------------
 untuk berhenti kirim  email  ke  [EMAIL PROTECTED]
 untuk melihat peraturan kirim email  ke  [EMAIL PROTECTED]
 arsip berada di  http://www.mail-archive.com/[email protected]
 

Kirim email ke