CVE-2019-18676

Priority
Description
An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect
input validation, there is a heap-based buffer overflow that can result in
Denial of Service to all clients using the proxy. Severity is high due to
this vulnerability occurring before normal security checks; any remote
client that can reach the proxy port can trivially perform the attack via a
crafted URI scheme.
Assigned-to
mdeslaur
Notes
mdeslaursame fix as CVE-2019-12523
This was fixed in 4.x by rewriting the URI parser to use SBuf.
Backporting the 4.x commit to 3.x is problematic.
As of 2019-12-04, no backport to 3.x is available, and no
details or reproducer for the issue is available to develop a
specific fix for 3.x.
Package
Source: squid (LP Ubuntu Debian)
Upstream:released (4.9-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):released (4.4-1ubuntu2.3)
Ubuntu 19.10 (Eoan Ermine):released (4.8-1ubuntu2.1)
Ubuntu 20.04 (Focal Fossa):released (4.9-2ubuntu1)
Patches:
Upstream:http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):deferred (2019-12-04)
Ubuntu 18.04 LTS (Bionic Beaver):deferred (2019-12-04)
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 (Focal Fossa):DNE
More Information

Updated: 2019-12-05 20:05:08 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)