First published: Thu Jul 11 2019(Updated: )
An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | >=3.3.9<=3.5.28 | |
Squid-Cache Squid | >=4.0<=4.7 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Fedoraproject Fedora | =29 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-12525.
CVE-2019-12525 has a severity value of 9.8, which is considered critical.
Squid versions 3.3.9 through 3.5.28 and 4.x through 4.7 are affected by CVE-2019-12525.
CVE-2019-12525 impacts Squid when configured to use Digest authentication by parsing the Proxy-Authorization header and searching for certain tokens.
Yes, remedies and updates are available for different affected software versions of Squid. Please refer to the provided references for more information on how to fix CVE-2019-12525.