CVE-2019-12521

An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 57%
VendorProductVersion
squid-cachesquid
3.0 ≤
𝑥
≤ 3.5.28
squid-cachesquid
4.0 ≤
𝑥
≤ 4.7
squid-cachesquid
5.0 ≤
𝑥
≤ 5.0.1
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
19.10
canonicalubuntu_linux
20.04
debiandebian_linux
9.0
debiandebian_linux
10.0
opensuseleap
15.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
squid
bullseye (security)
4.13-10+deb11u3
fixed
bullseye
4.13-10+deb11u3
fixed
bookworm
5.7-2+deb12u2
fixed
bookworm (security)
5.7-2+deb12u2
fixed
sid
6.12-1
fixed
trixie
6.12-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
squid
hirsute
Fixed 4.10-1ubuntu2
released
groovy
Fixed 4.10-1ubuntu2
released
focal
Fixed 4.10-1ubuntu1.1
released
eoan
Fixed 4.8-1ubuntu2.3
released
bionic
dne
xenial
dne
trusty
dne
squid3
hirsute
dne
groovy
dne
focal
dne
eoan
dne
bionic
Fixed 3.5.27-1ubuntu1.6
released
xenial
Fixed 3.5.12-1ubuntu7.11
released
trusty
dne