Severity
7.5HIGHNVD
EPSS
1.4%
top 19.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 26
Latest updateMay 24

Description

An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

Debiansquid/squid< 4.9-1+3
NVDsquid-cache/squid3.03.5.28+1

Also affects: Debian Linux 10.0, 9.0, Fedora 30, 31, Ubuntu Linux 16.04, 18.04, 19.04, 19.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-chw7-jm99-chw8: An issue was discovered in Squid 32022-05-24
CVEList
CVE-2019-18676: An issue was discovered in Squid 32019-11-26
OSV
CVE-2019-18676: An issue was discovered in Squid 32019-11-26

📋Vendor Advisories

4
Ubuntu
Squid vulnerabilities2020-08-03
Ubuntu
Squid vulnerabilities2019-12-04
Red Hat
squid: Buffer overflow in URI processor2019-11-05
Debian
CVE-2019-18676: squid - An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input...2019

💬Community

2
Bugzilla
CVE-2019-18676 squid: Buffer overflow in URI processor2019-11-08
Bugzilla
CVE-2019-18676 squid: Buffer overflow in URI processor [fedora-all]2019-11-08
CVE-2019-18676 — Out-of-bounds Write in Squid | cvebase