First published: Sun Dec 25 2022(Updated: )
A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | >=2.5<5.7 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-41318.
The severity of CVE-2022-41318 is high, with a severity value of 8.6.
Squid versions 2.5 through 5.6 are affected by CVE-2022-41318.
Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers in Squid are vulnerable to reading unintended memory locations, potentially exposing cleartext credentials.
Yes, patches and advisories are available. You can find them at the following links: [link1](http://www.squid-cache.org/Versions/v4/changesets/SQUID-2022_2.patch), [link2](http://www.squid-cache.org/Versions/v5/changesets/SQUID-2022_2.patch), [link3](https://github.com/squid-cache/squid/security/advisories/GHSA-394c-rr7q-6g78)