CVE-2020-11945

EUVD-2020-4282
An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
Affected Products (NVD)
VendorProductVersion
squid-cachesquid
3.0 ≤
𝑥
≤ 3.5.28
squid-cachesquid
4.0 ≤
𝑥
< 4.11
squid-cachesquid
5.0 ≤
𝑥
< 5.0.2
debiandebian_linux
9.0
debiandebian_linux
10.0
opensuseleap
15.1
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
19.10
canonicalubuntu_linux
20.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
squid
bookworm
5.7-2+deb12u2
fixed
bookworm (security)
5.7-2+deb12u2
fixed
bullseye
4.13-10+deb11u3
fixed
bullseye (security)
4.13-10+deb11u3
fixed
sid
6.12-1
fixed
trixie
6.12-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
squid
bionic
dne
eoan
Fixed 4.8-1ubuntu2.3
released
focal
Fixed 4.10-1ubuntu1.1
released
groovy
Fixed 4.10-1ubuntu2
released
hirsute
Fixed 4.10-1ubuntu2
released
trusty
dne
xenial
dne
squid3
bionic
Fixed 3.5.27-1ubuntu1.6
released
eoan
dne
focal
dne
groovy
dne
hirsute
dne
trusty
dne
xenial
Fixed 3.5.12-1ubuntu7.11
released
References