First published: Tue Nov 26 2019(Updated: )
An issue was discovered in Squid 3.x and 4.x through 4.8 when the append_domain setting is used (because the appended characters do not properly interact with hostname length restrictions). Due to incorrect message processing, it can inappropriately redirect traffic to origins it should not be delivered to.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | >=2.0<=2.7 | |
Squid-Cache Squid | >=3.0<=3.5.28 | |
Squid-Cache Squid | >=4.0<=4.8 | |
Squid-Cache Squid | =2.7-stable2 | |
Squid-Cache Squid | =2.7-stable3 | |
Squid-Cache Squid | =2.7-stable4 | |
Squid-Cache Squid | =2.7-stable5 | |
Squid-Cache Squid | =2.7-stable6 | |
Squid-Cache Squid | =2.7-stable7 | |
Squid-Cache Squid | =2.7-stable8 | |
Squid-Cache Squid | =2.7-stable9 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-18677.
The severity of CVE-2019-18677 is medium.
The affected software is Squid 3.x and 4.x through 4.8.
The vulnerability CVE-2019-18677 can inappropriately redirect traffic to origins it should not be delivered to due to incorrect message processing.
Yes, a fix is available for CVE-2019-18677. Users should update to version 4.9-2ubuntu1 or later for Ubuntu, or apply the appropriate patches for other affected systems.