Secunia Security Advisory - Mandriva has issued an update for squid. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
8f998196c604b7908598e2298999cce80114e6574978331bf39fb4e8a5fab1f9
TITLE:
Mandriva update for squid
SECUNIA ADVISORY ID:
SA17177
VERIFY ADVISORY:
https://secunia.com/advisories/17177/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
Mandrakelinux 10.1
https://secunia.com/product/4198/
Mandrake Corporate Server 2.x
https://secunia.com/product/1222/
DESCRIPTION:
Mandriva has issued an update for squid. This fixes a vulnerability,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service).
For more information:
SA16992
SOLUTION:
Apply updated packages.
Mandrakelinux 10.1:
2159ad83fce0c0e07abec59e859173df
10.1/RPMS/squid-2.5.STABLE9-1.4.101mdk.i586.rpm
c068938f3b353ac957c2781fdf3a668b
10.1/SRPMS/squid-2.5.STABLE9-1.4.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
5d348dff4c6af7f6fadb7a082949a625
x86_64/10.1/RPMS/squid-2.5.STABLE9-1.4.101mdk.x86_64.rpm
c068938f3b353ac957c2781fdf3a668b
x86_64/10.1/SRPMS/squid-2.5.STABLE9-1.4.101mdk.src.rpm
Corporate Server 2.1:
28f055d1dac940a09bf8d75739640e47
corporate/2.1/RPMS/squid-2.4.STABLE7-2.9.C21mdk.i586.rpm
1f673b3a7aad68b685463b96b8569157
corporate/2.1/SRPMS/squid-2.4.STABLE7-2.9.C21mdk.src.rpm
Corporate Server 2.1/X86_64:
d5d6450ca3c426b16a9c36b9b4030f6c
x86_64/corporate/2.1/RPMS/squid-2.4.STABLE7-2.9.C21mdk.x86_64.rpm
1f673b3a7aad68b685463b96b8569157
x86_64/corporate/2.1/SRPMS/squid-2.4.STABLE7-2.9.C21mdk.src.rpm
ORIGINAL ADVISORY:
https://www.mandriva.com/security/advisories?name=MDKSA-2005:181
OTHER REFERENCES:
SA16992:
https://secunia.com/advisories/16992/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------