Name | CVE-2019-18676 |
Description | An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2278-1, DSA-4682-1, ELA-271-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
squid (PTS) | buster (security), buster, buster (lts) | 4.6-1+deb10u10 | fixed |
bullseye (security), bullseye | 4.13-10+deb11u3 | fixed | |
bookworm (security), bookworm | 5.7-2+deb12u2 | fixed | |
sid, trixie | 6.12-1 | fixed | |
squid3 (PTS) | jessie, jessie (lts) | 3.5.23-5+deb8u7 | fixed |
stretch (security) | 3.5.23-5+deb9u7 | fixed | |
stretch (lts), stretch | 3.5.23-5+deb9u10 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
squid | source | wheezy | (unfixed) | end-of-life | ||
squid | source | buster | 4.6-1+deb10u2 | DSA-4682-1 | ||
squid | source | (unstable) | 4.9-1 | |||
squid3 | source | wheezy | (unfixed) | end-of-life | ||
squid3 | source | jessie | 3.5.23-5+deb8u1 | ELA-271-1 | ||
squid3 | source | stretch | 3.5.23-5+deb9u2 | DLA-2278-1 | ||
squid3 | source | (unstable) | (unfixed) |
http://www.squid-cache.org/Advisories/SQUID-2019_8.txt
Squid 4: http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch