CentOS 8 : squid:4 (CESA-2020:4743)

critical Nessus Plugin ID 145969

Synopsis

The remote CentOS host is missing one or more security updates.

Description

The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the CESA-2020:4743 advisory.

- squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520)

- squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521)

- squid: Improper input validation in URI processor (CVE-2019-12523)

- squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524)

- squid: Heap overflow issue in URN processing (CVE-2019-12526)

- squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)

- squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529)

- squid: Denial of service in cachemgr.cgi (CVE-2019-12854)

- squid: Buffer overflow in URI processor (CVE-2019-18676)

- squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677)

- squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678)

- squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679)

- squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860)

- squid: DoS in TLS handshake (CVE-2020-14058)

- squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049)

- squid: Improper input validation could result in a DoS (CVE-2020-24606)

- squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449)

- squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected libecap, libecap-devel and / or squid packages.

See Also

https://access.redhat.com/errata/RHSA-2020:4743

Plugin Details

Severity: Critical

ID: 145969

File Name: centos8_RHSA-2020-4743.nasl

Version: 1.5

Type: local

Agent: unix

Published: 2/1/2021

Updated: 5/10/2022

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2020-8450

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

CVSS Score Source: CVE-2019-12526

Vulnerability Information

CPE: cpe:/o:centos:centos:8, p-cpe:/a:centos:centos:libecap, p-cpe:/a:centos:centos:libecap-devel, p-cpe:/a:centos:centos:squid

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 11/4/2020

Vulnerability Publication Date: 7/11/2019

Reference Information

CVE: CVE-2019-12520, CVE-2019-12521, CVE-2019-12523, CVE-2019-12524, CVE-2019-12526, CVE-2019-12528, CVE-2019-12529, CVE-2019-12854, CVE-2019-18676, CVE-2019-18677, CVE-2019-18678, CVE-2019-18679, CVE-2019-18860, CVE-2020-8449, CVE-2020-8450, CVE-2020-14058, CVE-2020-15049, CVE-2020-24606

RHSA: 2020:4743