[ASA-201911-8] squid: multiple issues

Remi Gacogne rgacogne at archlinux.org
Thu Nov 7 11:39:18 UTC 2019


Arch Linux Security Advisory ASA-201911-8
=========================================

Severity: Critical
Date    : 2019-11-07
CVE-ID  : CVE-2019-12526 CVE-2019-18678 CVE-2019-18679
Package : squid
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1062

Summary
=======

The package squid before version 4.9-1 is vulnerable to multiple issues
including arbitrary code execution, content spoofing and information
disclosure.

Resolution
==========

Upgrade to 4.9-1.

# pacman -Syu "squid>=4.9-1"

The problems have been fixed upstream in version 4.9.

Workaround
==========

- CVE-2019-12526

Deny urn: protocol URI being proxied to all clients:

    acl URN proto URN
    http_access deny URN

- CVE-2019-18678

There are no workarounds for this vulnerability.

- CVE-2019-18679

Digest authentication can be disabled by removing all 'auth_param
digest ...' configuration settings from squid.conf.

Description
===========

- CVE-2019-12526 (arbitrary code execution)

A heap-based buffer overflow has been found in Squid before 4.9, when
processing URN.

- CVE-2019-18678 (content spoofing)

A HTTP request splitting issue has been found in Squid before 4.9. This
issue allows attackers to smuggle HTTP requests through frontend
software to a Squid which splits the HTTP Request pipeline differently.
The resulting Response messages corrupt caches between client and Squid
with attacker controlled content at arbitrary URLs.

- CVE-2019-18679 (information disclosure)

An information disclosure issue has been found in Squid before 4.9,
when processing HTTP Digest Authentication. The nonce tokens contain
the raw byte value of a pointer which sits within heap memory
allocation, which reduces ASLR protections and may aid attackers
isolating memory areas to target for remote code execution attacks.

Impact
======

A remote attacker might access sensitive information, corrupt the
content of arbitrary URLs in the caches or execute arbitrary code.

References
==========

http://www.squid-cache.org/Advisories/SQUID-2019_7.txt
http://www.squid-cache.org/Advisories/SQUID-2019_10.txt
http://www.squid-cache.org/Advisories/SQUID-2019_11.txt
http://www.squid-cache.org/Versions/v4/changesets/squid-4-7aa0184a720fd216191474e079f4fe87de7c4f5a.patch
http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch
http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patc
https://security.archlinux.org/CVE-2019-12526
https://security.archlinux.org/CVE-2019-18678
https://security.archlinux.org/CVE-2019-18679

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20191107/fb58df21/attachment.sig>


More information about the arch-security mailing list