CVE-2019-12527

An issue was discovered in Squid 4.0.23 through 4.7. When checking Basic Authentication with HttpHeader::getAuth, Squid uses a global buffer to store the decoded data. Squid does not check that the decoded length isn't greater than the buffer, leading to a heap-based buffer overflow with user controlled data.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html Broken Link
http://www.securityfocus.com/bid/109143 Broken Link Third Party Advisory VDB Entry
http://www.squid-cache.org/Versions/v4/changesets/ Vendor Advisory
http://www.squid-cache.org/Versions/v4/changesets/squid-4-7f73e9c5d17664b882ed32590e6af310c247f320.patch Patch Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:2593 Third Party Advisory
https://github.com/squid-cache/squid/commits/v4 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/
https://seclists.org/bugtraq/2019/Aug/42 Mailing List Third Party Advisory
https://usn.ubuntu.com/4065-1/ Third Party Advisory
https://www.debian.org/security/2019/dsa-4507 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html Broken Link
http://www.securityfocus.com/bid/109143 Broken Link Third Party Advisory VDB Entry
http://www.squid-cache.org/Versions/v4/changesets/ Vendor Advisory
http://www.squid-cache.org/Versions/v4/changesets/squid-4-7f73e9c5d17664b882ed32590e6af310c247f320.patch Patch Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:2593 Third Party Advisory
https://github.com/squid-cache/squid/commits/v4 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/
https://seclists.org/bugtraq/2019/Aug/42 Mailing List Third Party Advisory
https://usn.ubuntu.com/4065-1/ Third Party Advisory
https://www.debian.org/security/2019/dsa-4507 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*

History

21 Nov 2024, 04:23

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html - Broken Link
References () http://www.securityfocus.com/bid/109143 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/109143 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.squid-cache.org/Versions/v4/changesets/ - Vendor Advisory () http://www.squid-cache.org/Versions/v4/changesets/ - Vendor Advisory
References () http://www.squid-cache.org/Versions/v4/changesets/squid-4-7f73e9c5d17664b882ed32590e6af310c247f320.patch - Patch, Vendor Advisory () http://www.squid-cache.org/Versions/v4/changesets/squid-4-7f73e9c5d17664b882ed32590e6af310c247f320.patch - Patch, Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2019:2593 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2593 - Third Party Advisory
References () https://github.com/squid-cache/squid/commits/v4 - Patch, Third Party Advisory () https://github.com/squid-cache/squid/commits/v4 - Patch, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/ -
References () https://seclists.org/bugtraq/2019/Aug/42 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Aug/42 - Mailing List, Third Party Advisory
References () https://usn.ubuntu.com/4065-1/ - Third Party Advisory () https://usn.ubuntu.com/4065-1/ - Third Party Advisory
References () https://www.debian.org/security/2019/dsa-4507 - Third Party Advisory () https://www.debian.org/security/2019/dsa-4507 - Third Party Advisory

28 Feb 2023, 20:49

Type Values Removed Values Added
References (UBUNTU) https://usn.ubuntu.com/4065-1/ - (UBUNTU) https://usn.ubuntu.com/4065-1/ - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2019/dsa-4507 - (DEBIAN) https://www.debian.org/security/2019/dsa-4507 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html - Broken Link
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2593 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2593 - Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/42 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/42 - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html - Broken Link
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/ - Mailing List, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/109143 - Third Party Advisory (BID) http://www.securityfocus.com/bid/109143 - Broken Link, Third Party Advisory, VDB Entry
CPE cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*

Information

Published : 2019-07-11 19:15

Updated : 2024-11-21 04:23


NVD link : CVE-2019-12527

Mitre link : CVE-2019-12527

CVE.ORG link : CVE-2019-12527


JSON object : View

Products Affected

canonical

  • ubuntu_linux

redhat

  • enterprise_linux_server_tus
  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux

fedoraproject

  • fedora

debian

  • debian_linux

squid-cache

  • squid
CWE
CWE-787

Out-of-bounds Write