Your message dated Wed, 2 Nov 2005 16:07:10 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Fwd: Bug#334882: squid: [CVE-2005-3258] remote FTP buffer 
overflow
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 20 Oct 2005 13:42:23 +0000
>From [EMAIL PROTECTED] Thu Oct 20 06:42:23 2005
Return-path: <[EMAIL PROTECTED]>
Received: from box79162.elkhouse.de [213.9.79.162] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1ESagY-0000Ul-00; Thu, 20 Oct 2005 06:42:22 -0700
Received: from localhost.localdomain (unknown [195.227.105.178])
        (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
        (Client CN "Martin Pitt (workstation)", Issuer "piware CA" (verified 
OK))
        by box79162.elkhouse.de (Postfix) with ESMTP id D48FFBC4B0
        for <[EMAIL PROTECTED]>; Thu, 20 Oct 2005 15:41:50 +0200 (CEST)
Received: by localhost.localdomain (Postfix, from userid 1000)
        id 7D17219BF0; Thu, 20 Oct 2005 15:42:00 +0200 (CEST)
Date: Thu, 20 Oct 2005 15:42:00 +0200
From: Martin Pitt <[EMAIL PROTECTED]>
To: Debian BTS Submit <[EMAIL PROTECTED]>
Subject: squid: [CVE-2005-3258] remote FTP buffer overflow
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="xXmbgvnjoT4axfJE"
Content-Disposition: inline
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        RCVD_IN_BL_SPAMCOP_NET,RCVD_IN_SBLXBL,RCVD_IN_SBLXBL_CBL autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02


--xXmbgvnjoT4axfJE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: squid
Version: 2.5.10-6
Severity: critial
Tags: security patch

Hi Luigi!

There is a new buffer overflow in Squid:

| =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D
| Candidate: CVE-2005-3258
| URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-3258
| Reference: CONFIRM:http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid=
-2.5.STABLE11-rfc1738_do_escape
|=20
| The rfc1738_do_escape function in ftp.c for Squid 2.5 STABLE11 and
| earlier allows remote FTP servers to cause a denial of service
| (segmentation fault) via certain crafted responses.

(Please note the recent Mitre name change, vulnerabilities now have
the CVE prefix, not CAN any more).

In addition, I just noticed that in version 2.5.10-6 you added a
security patch 46-ntlm-scheme-assert.dpatch which is not actually
applied in 00list. Please add it. (One of the reasons why I hate
dpatch :-/ ).

Thanks,

Martin

--=20
Martin Pitt        http://www.piware.de
Ubuntu Developer   http://www.ubuntu.com
Debian Developer   http://www.debian.org

In a world without walls and fences, who needs Windows and Gates?

--xXmbgvnjoT4axfJE
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDV56oDecnbV4Fd/IRAt/lAKDcKIyRDDqKqbZzhOMG+isnlpFSagCeIgmG
0SF7GuMuG6Dap5U62n2EDNs=
=K9Pa
-----END PGP SIGNATURE-----

--xXmbgvnjoT4axfJE--

---------------------------------------
Received: (at 334882-done) by bugs.debian.org; 2 Nov 2005 15:07:50 +0000
>From [EMAIL PROTECTED] Wed Nov 02 07:07:50 2005
Return-path: <[EMAIL PROTECTED]>
Received: from ms004msg.fastwebnet.it [213.140.2.58] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EXKDO-00052s-00; Wed, 02 Nov 2005 07:07:50 -0800
Received: from localhost.localdomain (23.21.172.54) by ms004msg.fastwebnet.it 
(7.2.066)
        id 4360FA1500125766 for [EMAIL PROTECTED]; Wed, 2 Nov 2005 16:07:15 
+0100
Received: from [127.0.0.1] (localhost [127.0.0.1])
        by localhost.localdomain (Postfix) with ESMTP id B17781A91B1
        for <[EMAIL PROTECTED]>; Wed,  2 Nov 2005 16:07:14 +0100 (CET)
Mime-Version: 1.0 (Apple Message framework v746.2)
References: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <[EMAIL PROTECTED]>
Content-Transfer-Encoding: 7bit
From: Luigi Gangitano <[EMAIL PROTECTED]>
Subject: Fwd: Bug#334882: squid: [CVE-2005-3258] remote FTP buffer overflow
Date: Wed, 2 Nov 2005 16:07:10 +0100
To: [EMAIL PROTECTED]
X-Pgp-Agent: GPGMail 1.1.1 (Tiger)
X-Mailer: Apple Mail (2.746.2)
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_01,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This bug does not apply to any version of squid in debian.

Inizio messaggio inoltrato:

> Rinvia-Da: Luigi Gangitano <[EMAIL PROTECTED]>
> Da: Luigi Gangitano <[EMAIL PROTECTED]>
> Data: 21 ottobre 2005 1:08:55 GMT+02:00
> Rinvia-A: debian-bugs-dist@lists.debian.org
> A: Martin Pitt <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
> Rinvia-Cc: Luigi Gangitano <[EMAIL PROTECTED]>
> Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
> Oggetto: Bug#334882: squid: [CVE-2005-3258] remote FTP buffer overflow
> Rispondi a: Luigi Gangitano <[EMAIL PROTECTED]>,  
> [EMAIL PROTECTED]
>
> notfound 334882 2.5.10-6
> notfound 334882 2.5.9-10sarge2
> thanks
>
> Hi Martin,
> thanks for reporting this. Actually this bug was introduced in a  
> patch to squid-2.5.STABLE10 that has never been applied to a debian  
> package. So Debian is not affected. I did not upload any package  
> based on squid-2.5.STABLE11 since upstream stated that this release  
> is known to be badly broken.
>
> I just fixed the missing patch for the previous bug and will upload  
> it shortly.
>
> Regards,
>
> L
>
> Il giorno 20/ott/05, alle ore 15:42, Martin Pitt ha scritto:
>
>> Package: squid
>> Version: 2.5.10-6
>> Severity: critial
>> Tags: security patch
>>
>> Hi Luigi!
>>
>> There is a new buffer overflow in Squid:
>>
>> | ======================================================
>> | Candidate: CVE-2005-3258
>> | URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3258
>> | Reference: CONFIRM:http://www.squid-cache.org/Versions/v2/2.5/ 
>> bugs/#squid-2.5.STABLE11-rfc1738_do_escape
>> |
>> | The rfc1738_do_escape function in ftp.c for Squid 2.5 STABLE11 and
>> | earlier allows remote FTP servers to cause a denial of service
>> | (segmentation fault) via certain crafted responses.
>>
>> (Please note the recent Mitre name change, vulnerabilities now have
>> the CVE prefix, not CAN any more).
>>
>> In addition, I just noticed that in version 2.5.10-6 you added a
>> security patch 46-ntlm-scheme-assert.dpatch which is not actually
>> applied in 00list. Please add it. (One of the reasons why I hate
>> dpatch :-/ ).

- --
Luigi Gangitano -- <[EMAIL PROTECTED]> -- <[EMAIL PROTECTED]>
GPG: 1024D/924C0C26: 12F8 9C03 89D3 DB4A 9972  C24A F19B A618 924C 0C26


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Darwin)

iD8DBQFDaNYh8ZumGJJMDCYRAvwfAJ9zke4n8opDb7zigz5EZQS+AwGIOgCeKPol
MQqu8KvX68PGpt9i/Sk7BDE=
=f6AS
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to