First published: Tue Feb 04 2020(Updated: )
An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | <4.10 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.1 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
IBM Security Guardium | <=10.5 | |
IBM Security Guardium | <=10.6 | |
IBM Security Guardium | <=11.0 | |
IBM Security Guardium | <=11.1 | |
IBM Security Guardium | <=11.2 | |
IBM Security Guardium | <=11.3 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12528 is a vulnerability in Squid that allows a crafted FTP server to trigger disclosure of sensitive information.
CVE-2019-12528 has a severity level of 7.5 (high).
The affected software versions include Squid 4.6-1+deb10u7, 4.6-1+deb10u8, 4.13-10+deb11u2, 5.7-2, and 6.3-1.
To fix CVE-2019-12528, update Squid to version 4.10 or later.
You can find more information about CVE-2019-12528 at the following references: http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html, http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html, http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html