CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
96.2%
An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.
Vendor | Product | Version | CPE |
---|---|---|---|
squid-cache | squid | * | cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:* |
squid-cache | squid | 2.7 | cpe:2.3:a:squid-cache:squid:2.7:stable2:*:*:*:*:*:* |
squid-cache | squid | 2.7 | cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:* |
squid-cache | squid | 2.7 | cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:* |
squid-cache | squid | 2.7 | cpe:2.3:a:squid-cache:squid:2.7:stable5:*:*:*:*:*:* |
squid-cache | squid | 2.7 | cpe:2.3:a:squid-cache:squid:2.7:stable6:*:*:*:*:*:* |
squid-cache | squid | 2.7 | cpe:2.3:a:squid-cache:squid:2.7:stable7:*:*:*:*:*:* |
squid-cache | squid | 2.7 | cpe:2.3:a:squid-cache:squid:2.7:stable8:*:*:*:*:*:* |
squid-cache | squid | 2.7 | cpe:2.3:a:squid-cache:squid:2.7:stable9:*:*:*:*:*:* |
canonical | ubuntu_linux | 16.04 | cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* |
www.squid-cache.org/Advisories/SQUID-2019_11.txt
www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch
bugzilla.suse.com/show_bug.cgi?id=1156324
github.com/squid-cache/squid/pull/491
lists.debian.org/debian-lts-announce/2019/12/msg00011.html
lists.debian.org/debian-lts-announce/2020/07/msg00009.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/
security.gentoo.org/glsa/202003-34
usn.ubuntu.com/4213-1/
www.debian.org/security/2020/dsa-4682
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
96.2%