CVE-2022-41318

EUVD-2022-44526
A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
CISA-ADPADP
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 36%
Affected Products (NVD)
VendorProductVersion
squid-cachesquid
2.5 ≤
𝑥
< 5.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
squid
bookworm
5.7-2+deb12u2
fixed
bookworm (security)
5.7-2+deb12u2
fixed
bullseye
4.13-10+deb11u3
fixed
bullseye (security)
4.13-10+deb11u3
fixed
sid
6.12-1
fixed
trixie
6.12-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
squid
bionic
dne
focal
Fixed 4.10-1ubuntu1.7
released
jammy
Fixed 5.2-1ubuntu4.2
released
kinetic
Fixed 5.6-1ubuntu3
released
lunar
Fixed 5.6-1ubuntu3
released
mantic
Fixed 5.6-1ubuntu3
released
noble
Fixed 5.6-1ubuntu3
released
trusty
ignored
xenial
ignored
squid3
bionic
Fixed 3.5.27-1ubuntu1.14
released
focal
dne
jammy
dne
trusty
ignored
xenial
Fixed 3.5.12-1ubuntu7.16+esm3
released