Description
An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2278-1 | squid3 security update |
Debian DSA |
DSA-4682-1 | squid security update |
EUVD |
EUVD-2019-8392 | An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme. |
Ubuntu USN |
USN-4213-1 | Squid vulnerabilities |
Ubuntu USN |
USN-4446-1 | Squid vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:54:14.482Z
Reserved: 2019-11-04T00:00:00.000Z
Link: CVE-2019-18676
No data.
Status : Modified
Published: 2019-11-26T17:15:12.843
Modified: 2024-11-21T04:33:30.657
Link: CVE-2019-18676
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN