First published: Tue Nov 26 2019(Updated: )
An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | >=2.0<=2.7 | |
Squid-Cache Squid | >=3.0<=3.5.28 | |
Squid-Cache Squid | >=4.0<=4.8 | |
Squid-Cache Squid | =2.7-stable2 | |
Squid-Cache Squid | =2.7-stable3 | |
Squid-Cache Squid | =2.7-stable4 | |
Squid-Cache Squid | =2.7-stable5 | |
Squid-Cache Squid | =2.7-stable6 | |
Squid-Cache Squid | =2.7-stable7 | |
Squid-Cache Squid | =2.7-stable8 | |
Squid-Cache Squid | =2.7-stable9 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
Debian Debian Linux | =8.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-18679.
Squid 2.x, 3.x, and 4.x through 4.8 are affected.
CVE-2019-18679 has a severity rating of 7.5 (high).
Upgrade to Squid 4.9-2ubuntu1 (or later), or apply the recommended patches.
More information can be found at the following references: [Link 1](http://www.squid-cache.org/Advisories/SQUID-2019_11.txt), [Link 2](http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch), [Link 3](https://bugzilla.suse.com/show_bug.cgi?id=1156324)