First published: Mon Jul 15 2019(Updated: )
It was discovered that Squid incorrectly handled certain SNMP packets. A remote attacker could possibly use this issue to cause memory consumption, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-19132) It was discovered that Squid incorrectly handled the cachemgr.cgi web module. A remote attacker could possibly use this issue to conduct cross-site scripting (XSS) attacks. (CVE-2019-13345)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/squid | <4.4-1ubuntu2.1 | 4.4-1ubuntu2.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/squid3 | <3.5.27-1ubuntu1.2 | 3.5.27-1ubuntu1.2 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/squid3 | <3.5.12-1ubuntu7.7 | 3.5.12-1ubuntu7.7 |
Ubuntu OpenSSH Client | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-19132.
This vulnerability could lead to memory consumption and a denial of service.
This vulnerability affects Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
To fix this vulnerability in Ubuntu 16.04 LTS, update Squid to version 3.5.12-1ubuntu7.7.
You can find more information about this vulnerability in the Ubuntu Security Notices USN-4059-1.