CVE-2019-12525

An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

History

26 Apr 2022, 20:18

Type Values Removed Values Added
CWE CWE-119 CWE-787
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/07/msg00018.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/07/msg00018.html - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4065-2/ - (UBUNTU) https://usn.ubuntu.com/4065-2/ - Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/ - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4065-1/ - (UBUNTU) https://usn.ubuntu.com/4065-1/ - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2019/dsa-4507 - (DEBIAN) https://www.debian.org/security/2019/dsa-4507 - Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/42 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/42 - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html - Mailing List, Third Party Advisory

Information

Published : 2019-07-11 19:15

Updated : 2024-02-04 20:20


NVD link : CVE-2019-12525

Mitre link : CVE-2019-12525

CVE.ORG link : CVE-2019-12525


JSON object : View

Products Affected

debian

  • debian_linux

squid-cache

  • squid

canonical

  • ubuntu_linux

opensuse

  • leap

fedoraproject

  • fedora
CWE
CWE-787

Out-of-bounds Write