FreeBSD Ports Security Advisory FreeBSD-SA-01:61.squid

FreeBSD Security Advisories security-advisories at
Mon Oct 8 14:08:15 PDT 2001


FreeBSD-SA-01:61                                           Security Advisory
                                                                FreeBSD, Inc.

Topic:          Squid in accelerator-only mode ignores ACLs

Category:       ports
Modules:        squid22, squid23, squid24
Announced:      2001-10-08
Credits:        Paul Nasrat <pnasrat at>
Affects:        Ports collection prior to the correction date.
Corrected:      2001-07-29 12:29:00 (squid23)
                2001-08-28 16:48:35 2001 UTC (squid24)
FreeBSD only:   NO

I.   Background

The Squid Internet Object Cache is a web proxy/cache.

II.  Problem Description

If squid is configured in acceleration-only mode (http_accel_host is
set, but http_accel_with_proxy is off), then as a result of a bug,
access control lists (ACLs) are ignored.

III. Impact

A remote attacker may use the squid server in order to issue requests
to hosts that are otherwise inaccessible.  Because the squid server
processes these requests as HTTP requests, the attacker cannot send or
retrieve arbitrary data.  However, the attacker could use squid's
response to determine if a particular port is open on a victim host.
Therefore, the squid server may be used to conduct a port scan.

IV.  Workaround

1) Do not run squid in acceleration-only mode.

2) Deinstall the squid port/package if you have it installed.

V.   Solution

The port squid-2.3_1 and later 2.3 versions, and the port squid-2.4_5
and later 2.4 versions include fixes for this vulnerability.  The
squid-2.3 and squid-2.2 ports have been deprecated and removed from
the ports collection, and users are advised to upgrade to squid-2.4 as
soon as possible.

1) Upgrade your entire ports collection and rebuild the squid port.

2) Deinstall the old package and install a new package dated after the
correction date, obtained from the following directories:


Packages are not automatically generated for the alpha architecture at
this time due to lack of build resources.

3) Download a new port skeleton for the procmail port from:

and use it to rebuild the port.

4) Use the portcheckout utility to automate option (3) above. The
portcheckout port is available in /usr/ports/devel/portcheckout or the
package can be obtained from:

VI.  Correction details

The following list contains the revision numbers of each file that was
corrected in the FreeBSD ports collection.

Affected port
  Path                                                           Revision
- -------------------------------------------------------------------------
  ports/www/squid23/Makefile                                         1.78
  ports/www/squid23/distinfo                                         1.57
  ports/www/squid24/Makefile                                         1.84
  ports/www/squid24/distinfo                                         1.61
- -------------------------------------------------------------------------  

VII. References

Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see


This is the moderated mailing list freebsd-announce.
The list contains announcements of new FreeBSD capabilities,
important events and project milestones.
See also the FreeBSD Web pages at

To Unsubscribe: send mail to majordomo at
with "unsubscribe freebsd-announce" in the body of the message

More information about the freebsd-announce mailing list