First published: Wed Jul 17 2019(Updated: )
USN-4059-1 and USN-3557-1 fixed several vulnerabilities in Squid. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: Louis Dion-Marcil discovered that Squid incorrectly handled certain Edge Side Includes (ESI) responses. A malicious remote server could possibly cause Squid to crash, resulting in a denial of service. (CVE-2018-1000024) Louis Dion-Marcil discovered that Squid incorrectly handled certain Edge Side Includes (ESI) responses. A malicious remote server could possibly cause Squid to crash, resulting in a denial of service. (CVE-2018-1000027) It was discovered that Squid incorrectly handled the cachemgr.cgi web module. A remote attacker could possibly use this issue to conduct cross-site scripting (XSS) attacks. (CVE-2019-13345)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/squid3 | <3.1.19-1ubuntu3.12.04.9 | 3.1.19-1ubuntu3.12.04.9 |
=12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID of this advisory is USN-4059-2.
The affected software is Squid version 3.1.19-1ubuntu3.12.04.9 on Ubuntu 12.04.
The severity of this vulnerability is not provided in the advisory.
To fix this vulnerability, update Squid to the latest version provided by the Ubuntu 12.04 ESM.
More information about this vulnerability can be found at the following references: - [CVE-2018-1000024](https://ubuntu.com/security/CVE-2018-1000024) - [CVE-2018-1000027](https://ubuntu.com/security/CVE-2018-1000027) - [CVE-2019-13345](https://ubuntu.com/security/CVE-2019-13345)