An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/squid-cache/squid/pull/275 | third party advisory patch |
http://www.squid-cache.org/Advisories/SQUID-2019_8.txt | third party advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1156329 | issue tracking third party advisory |
http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch | patch |
https://usn.ubuntu.com/4213-1/ | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/ | vendor advisory |
https://www.debian.org/security/2020/dsa-4682 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html | third party advisory mailing list |
https://usn.ubuntu.com/4446-1/ | third party advisory vendor advisory |