Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-18676
HistoryNov 26, 2019 - 12:00 a.m.

CVE-2019-18676

2019-11-2600:00:00
ubuntu.com
ubuntu.com
16

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.018

Percentile

88.1%

An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect
input validation, there is a heap-based buffer overflow that can result in
Denial of Service to all clients using the proxy. Severity is high due to
this vulnerability occurring before normal security checks; any remote
client that can reach the proxy port can trivially perform the attack via a
crafted URI scheme.

Notes

Author Note
mdeslaur same fix as CVE-2019-12523 This was fixed in 4.x by rewriting the URI parser to use SBuf. fixed in Debian’s 3.5.23-5+deb9u2
OSVersionArchitecturePackageVersionFilename
ubuntu19.04noarchsquid< 4.4-1ubuntu2.3UNKNOWN
ubuntu19.10noarchsquid< 4.8-1ubuntu2.1UNKNOWN
ubuntu20.04noarchsquid< 4.9-2ubuntu1UNKNOWN
ubuntu20.10noarchsquid< 4.9-2ubuntu1UNKNOWN
ubuntu21.04noarchsquid< 4.9-2ubuntu1UNKNOWN
ubuntu18.04noarchsquid3< 3.5.27-1ubuntu1.7UNKNOWN
ubuntu16.04noarchsquid3< 3.5.12-1ubuntu7.12UNKNOWN

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.018

Percentile

88.1%