CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
96.2%
According to its self-reported version number, the version of Squid installed on the remote host is prior to 4.9. It is, therefore, affected by multiple vulnerabilities:
A heap overflow and possible a remote code execution exist due to incorrect buffer management when processing URN. (CVE-2019-12526)
A security bypass exists due to improper input validation. An attacker can gain access to restricted HTTP servers. (CVE-2019-12523)
A buffer overflow exists due to incorrect input validation which can result in denial of service to all clients using the proxy. (CVE-2019-18676)
A traffic redirect exists due to incorrect message processing with append_domain settings. (CVE-2019-18677)
A HTTP request splitting exists due to incorrect message parsing. (CVE-2019-18678)
An information disclosure exists due to incorrect data management when processing HTTP Digest Authentication. (CVE-2019-18679) Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.
No source data
Vendor | Product | Version | CPE |
---|---|---|---|
squid-cache | squid | * | cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:* |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12523
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12526
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18676
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18677
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18678
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18679
www.squid-cache.org/Advisories/SQUID-2019_10.txt
www.squid-cache.org/Advisories/SQUID-2019_11.txt
www.squid-cache.org/Advisories/SQUID-2019_7.txt
www.squid-cache.org/Advisories/SQUID-2019_8.txt
www.squid-cache.org/Advisories/SQUID-2019_9.txt
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
96.2%