An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.
References
Link | Resource |
---|---|
http://www.squid-cache.org/Advisories/SQUID-2019_8.txt | Third Party Advisory |
http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch | Patch |
https://bugzilla.suse.com/show_bug.cgi?id=1156329 | Issue Tracking Third Party Advisory |
https://github.com/squid-cache/squid/pull/275 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/ | |
https://usn.ubuntu.com/4213-1/ | Third Party Advisory |
https://usn.ubuntu.com/4446-1/ | Third Party Advisory |
https://www.debian.org/security/2020/dsa-4682 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-11-26T16:23:49
Updated: 2020-08-05T19:06:07
Reserved: 2019-11-04T00:00:00
Link: CVE-2019-18676
JSON object: View
NVD Information
Status : Modified
Published: 2019-11-26T17:15:12.843
Modified: 2023-11-07T03:06:53.740
Link: CVE-2019-18676
JSON object: View
Redhat Information
No data.
CWE