First published: Tue Nov 26 2019(Updated: )
An issue was discovered in Squid before 4.9. URN response handling in Squid suffers from a heap-based buffer overflow. When receiving data from a remote server in response to an URN request, Squid fails to ensure that the response can fit within the buffer. This leads to attacker controlled data overflowing in the heap.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | >=3.0<=3.5.28 | |
Squid-Cache Squid | >=4.0<=4.8 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
openSUSE Leap | =15.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12526 is a vulnerability in Squid before version 4.9 that allows for a heap-based buffer overflow.
CVE-2019-12526 is classified as critical with a severity value of 9.8.
Squid versions up to 4.9-2ubuntu1 and 4.4-1ubuntu2.3 are affected by CVE-2019-12526.
To fix CVE-2019-12526, update Squid to version 4.9-2ubuntu1 or 4.4-1ubuntu2.3.
More information about CVE-2019-12526 can be found at the following references: [CVE page](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12526), [Squid advisory](http://www.squid-cache.org/Advisories/SQUID-2019_7.txt), [Ubuntu security notice](https://ubuntu.com/security/notices/USN-4213-1).