CVE-2019-12526
26.11.2019, 17:15
An issue was discovered in Squid before 4.9. URN response handling in Squid suffers from a heap-based buffer overflow. When receiving data from a remote server in response to an URN request, Squid fails to ensure that the response can fit within the buffer. This leads to attacker controlled data overflowing in the heap.Enginsight
| Vendor | Product | Version |
|---|---|---|
| squid-cache | squid | 3.0 ≤ 𝑥 ≤ 3.5.28 |
| squid-cache | squid | 4.0 ≤ 𝑥 ≤ 4.8 |
| canonical | ubuntu_linux | 16.04 |
| canonical | ubuntu_linux | 18.04 |
| canonical | ubuntu_linux | 19.04 |
| canonical | ubuntu_linux | 19.10 |
| opensuse | leap | 15.0 |
| debian | debian_linux | 8.0 |
| debian | debian_linux | 9.0 |
| debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| squid |
| ||||||||||||||||
| squid3 |
|
Common Weakness Enumeration
References