Squid Proxy 2.5 Stable/3 Pre NTLM Authentication ntlm_fetch_string denial of service
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.2 | $0-$5k | 0.00 |
A vulnerability has been found in Squid Proxy 2.5 Stable/3 Pre (Firewall Software) and classified as critical. Affected by this vulnerability is the function ntlm_fetch_string
of the component NTLM Authentication. The manipulation with an unknown input leads to a denial of service vulnerability. The CWE definition for the vulnerability is CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. As an impact it is known to affect availability. The summary by CVE is:
Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).
The bug was discovered 06/08/2004. The weakness was presented 09/03/2004 by Marco Ortisi with Squid Team (Website). It is possible to read the advisory at squid-cache.org. This vulnerability is known as CVE-2004-0541 since 06/04/2004. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details and also a public exploit are known. The attack technique deployed by this issue is T1499 according to MITRE ATT&CK.
A public exploit has been developed in Perl Module. It is possible to download the exploit at securityfocus.com. It is declared as highly functional. The vulnerability was handled as a non-public zero-day exploit for at least 631 days. During that time the estimated underground price was around $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 14524 (GLSA-200406-13 : Squid: NTLM authentication helper buffer overflow), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Gentoo Local Security Checks and running in the context l.
Upgrading eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at www1.uk.squid-cache.org. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published even before and not after the disclosure of the vulnerability. Attack attempts may be identified with Snort ID 12362. In this case the pattern Proxy-Authorization|3A| NTLM TlRMTVNTUAADA
is used for detection. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 2903.
The vulnerability is also documented in the databases at X-Force (16360) and Tenable (14524). Additional details are provided at www1.uk.squid-cache.org. See 698 and 22366 for similar entries.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 7.2
VulDB Base Score: 7.5
VulDB Temp Score: 7.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Highly functional
Programming Language: 🔍
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 14524
Nessus Name: GLSA-200406-13 : Squid: NTLM authentication helper buffer overflow
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Nessus Port: 🔍
OpenVAS ID: 52454
OpenVAS Name: FreeBSD Ports: squid
OpenVAS File: 🔍
OpenVAS Family: 🔍
MetaSploit ID: squid_ntlm_authenticate.rb
MetaSploit Name: Squid NTLM Authenticate Overflow
MetaSploit File: 🔍
ATK: 203
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Patch: www1.uk.squid-cache.org
Snort ID: 12362
Snort Message: EXPLOIT Squid HTTP Proxy-Authorization overflow
Snort Pattern: 🔍
TippingPoint: 🔍
McAfee IPS: 🔍
McAfee IPS Version: 🔍
ISS Proventia IPS: 🔍
PaloAlto IPS: 🔍
Fortigate IPS: 🔍
Timeline
09/25/2002 🔍06/04/2004 🔍
06/08/2004 🔍
06/09/2004 🔍
06/17/2004 🔍
06/29/2004 🔍
07/26/2004 🔍
08/06/2004 🔍
08/30/2004 🔍
09/03/2004 🔍
09/03/2004 🔍
09/03/2004 🔍
09/03/2004 🔍
09/06/2004 🔍
06/29/2019 🔍
Sources
Vendor: squid-cache.orgAdvisory: squid-cache.org
Researcher: Marco Ortisi
Organization: Squid Team
Status: Confirmed
CVE: CVE-2004-0541 (🔍)
OVAL: 🔍
X-Force: 16360 - Squid Web Proxy Cache NTLM buffer overflow, High Risk
SecurityTracker: 1011148
Vulnerability Center: 4853 - Buffer overflow in Ntlm_check_auth Function for Squid Web Proxy Cache 2.5.x and 3.x, Medium
SecurityFocus: 10500 - Squid Proxy NTLM Authentication Buffer Overflow Vulnerability
Secunia: 12444 - Squid NTLM Authentication Denial of Service Vulnerability, Moderately Critical
OSVDB: 9551 - Squid NTLM Authentication Malformed NTLMSSP Packet DoS
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
See also: 🔍
Entry
Created: 09/06/2004 11:32Updated: 06/29/2019 10:23
Changes: 09/06/2004 11:32 (101), 06/29/2019 10:23 (20)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.