CVE-2019-18676

An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 77%
VendorProductVersion
squid-cachesquid
3.0 ≤
𝑥
≤ 3.5.28
squid-cachesquid
4.0 ≤
𝑥
≤ 4.8
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
19.04
canonicalubuntu_linux
19.10
debiandebian_linux
9.0
debiandebian_linux
10.0
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
squid
bullseye (security)
4.13-10+deb11u3
fixed
bullseye
4.13-10+deb11u3
fixed
bookworm
5.7-2+deb12u2
fixed
bookworm (security)
5.7-2+deb12u2
fixed
sid
6.12-1
fixed
trixie
6.12-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
squid
hirsute
Fixed 4.9-2ubuntu1
released
groovy
Fixed 4.9-2ubuntu1
released
focal
Fixed 4.9-2ubuntu1
released
eoan
Fixed 4.8-1ubuntu2.1
released
disco
Fixed 4.4-1ubuntu2.3
released
bionic
dne
xenial
dne
trusty
dne
squid3
hirsute
dne
groovy
dne
focal
dne
eoan
dne
disco
dne
bionic
Fixed 3.5.27-1ubuntu1.7
released
xenial
Fixed 3.5.12-1ubuntu7.12
released
trusty
dne