CVE-2019-18676

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.

References

http://www.squid-cache.org/Advisories/SQUID-2019_8.txt

http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch

https://bugzilla.suse.com/show_bug.cgi?id=1156329

https://github.com/squid-cache/squid/pull/275

https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/

https://lists.fedoraproject.org/archives/list/[email protected]/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/

https://usn.ubuntu.com/4213-1/

https://usn.ubuntu.com/4446-1/

https://www.debian.org/security/2020/dsa-4682

Details

Source: MITRE

Published: 2019-11-26

Updated: 2020-08-24

Type: CWE-787

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
150657SUSE SLES11 Security Update : squid3 (SUSE-SU-2020:14460-1)NessusSuSE Local Security Checks
high
149133EulerOS 2.0 SP3 : squid (EulerOS-SA-2021-1852)NessusHuawei Local Security Checks
critical
112694Squid < 4.9 Multiple VulnerabilitiesWeb Application ScanningComponent Vulnerability
critical
145969CentOS 8 : squid:4 (CESA-2020:4743)NessusCentOS Local Security Checks
high
142412RHEL 8 : squid:4 (RHSA-2020:4743)NessusRed Hat Local Security Checks
high
140028Ubuntu 16.04 LTS / 18.04 LTS : Squid regression (USN-4446-2)NessusUbuntu Local Security Checks
critical
139313Ubuntu 16.04 LTS / 18.04 LTS : Squid vulnerabilities (USN-4446-1)NessusUbuntu Local Security Checks
critical
136430Debian DSA-4682-1 : squid - security updateNessusDebian Local Security Checks
high
134561SUSE SLES12 Security Update : squid (SUSE-SU-2020:0661-1)NessusSuSE Local Security Checks
high
133934EulerOS 2.0 SP5 : squid (EulerOS-SA-2020-1133)NessusHuawei Local Security Checks
critical
132627EulerOS 2.0 SP8 : squid (EulerOS-SA-2020-1034)NessusHuawei Local Security Checks
critical
131723Ubuntu 16.04 LTS / 18.04 LTS / 19.04 / 19.10 : squid, squid3 vulnerabilities (USN-4213-1)NessusUbuntu Local Security Checks
critical
131714Fedora 31 : 7:squid (2019-9538783033)NessusFedora Local Security Checks
critical
131707Fedora 30 : 7:squid (2019-0b16cbdd0e)NessusFedora Local Security Checks
critical
131386SUSE SLES12 Security Update : squid (SUSE-SU-2019:3067-1)NessusSuSE Local Security Checks
critical
131220openSUSE Security Update : squid (openSUSE-2019-2541)NessusSuSE Local Security Checks
critical
131219openSUSE Security Update : squid (openSUSE-2019-2540)NessusSuSE Local Security Checks
critical
131070SUSE SLES15 Security Update : squid (SUSE-SU-2019:2975-1)NessusSuSE Local Security Checks
critical