CVE-2019-18676

Current Description

An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.

Basic Data

PublishedNovember 26, 2019
Last ModifiedAugust 05, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-20
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationSquid-cacheSquid********3.03.5.28
    2.3ApplicationSquid-cacheSquid********4.04.8
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSCanonicalUbuntu Linux16.04***lts***
    2.3OSCanonicalUbuntu Linux18.04***lts***
    2.3OSCanonicalUbuntu Linux19.04*******
    2.3OSCanonicalUbuntu Linux19.10*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSFedoraprojectFedora30*******
    2.3OSFedoraprojectFedora31*******

Vulnerable Software List

VendorProductVersions
Canonical Ubuntu Linux 16.04, 18.04, 19.04, 19.10
Squid-cache Squid *
Fedoraproject Fedora 30, 31

References

NameSourceURLTags
http://www.squid-cache.org/Advisories/SQUID-2019_8.txthttp://www.squid-cache.org/Advisories/SQUID-2019_8.txtCONFIRMThird Party Advisory
http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patchhttp://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.pCONFIRMPatch
https://bugzilla.suse.com/show_bug.cgi?id=1156329https://bugzilla.suse.com/show_bug.cgi?id=1156329CONFIRMIssue Tracking Third Party Advisory
https://github.com/squid-cache/squid/pull/275https://github.com/squid-cache/squid/pull/275MISCPatch Third Party Advisory
[debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security updatehttps://lists.debian.org/debian-lts-announce/2020/07/msg00009.htmlMLIST
FEDORA-2019-9538783033https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTM74FEDORAMailing List Third Party Advisory
FEDORA-2019-0b16cbdd0ehttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEMOYFEDORAMailing List Third Party Advisory
USN-4213-1https://usn.ubuntu.com/4213-1/UBUNTUThird Party Advisory
USN-4446-1https://usn.ubuntu.com/4446-1/UBUNTU
DSA-4682https://www.debian.org/security/2020/dsa-4682DEBIAN