CVE-2019-12519
15.04.2020, 20:15
An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expression, it could either evaluate the top of the stack, or add a new member to the stack. When adding a new member, there is no check to ensure that the stack won't overflow.Enginsight
Vendor | Product | Version |
---|---|---|
squid-cache | squid | 3.0 ≤ 𝑥 ≤ 3.5.28 |
squid-cache | squid | 4.0 ≤ 𝑥 ≤ 4.10 |
squid-cache | squid | 5.0 ≤ 𝑥 ≤ 5.0.1 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 19.10 |
canonical | ubuntu_linux | 20.04 |
opensuse | leap | 15.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
squid |
| ||||||||||||||
squid3 |
|
Common Weakness Enumeration
References