CVE-2019-18678

Priority
Description
An issue was discovered in Squid 3.x and 4.x through 4.8. It allows
attackers to smuggle HTTP requests through frontend software to a Squid
instance that splits the HTTP Request pipeline differently. The resulting
Response messages corrupt caches (between a client and Squid) with
attacker-controlled content at arbitrary URLs. Effects are isolated to
software between the attacker client and Squid. There are no effects on
Squid itself, nor on any upstream servers. The issue is related to a
request header containing whitespace between a header name and a colon.
Assigned-to
mdeslaur
Notes
Package
Source: squid (LP Ubuntu Debian)
Upstream:released (4.9-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):released (4.4-1ubuntu2.3)
Ubuntu 19.10 (Eoan Ermine):released (4.8-1ubuntu2.1)
Ubuntu 20.04 (Focal Fossa):released (4.9-2ubuntu1)
Patches:
Upstream:http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (3.5.12-1ubuntu7.9)
Ubuntu 18.04 LTS (Bionic Beaver):released (3.5.27-1ubuntu1.4)
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 (Focal Fossa):DNE
More Information

Updated: 2019-12-05 20:05:09 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)