Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-18679
HistoryNov 26, 2019 - 12:00 a.m.

CVE-2019-18679

2019-11-2600:00:00
ubuntu.com
ubuntu.com
17

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.185 Low

EPSS

Percentile

96.2%

An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to
incorrect data management, it is vulnerable to information disclosure when
processing HTTP Digest Authentication. Nonce tokens contain the raw byte
value of a pointer that sits within heap memory allocation. This
information reduces ASLR protections and may aid attackers isolating memory
areas to target for remote code execution attacks.

Notes

Author Note
mdeslaur same patch as CVE-2019-18678
OSVersionArchitecturePackageVersionFilename
ubuntu19.04noarchsquid< 4.4-1ubuntu2.3UNKNOWN
ubuntu19.10noarchsquid< 4.8-1ubuntu2.1UNKNOWN
ubuntu20.04noarchsquid< 4.9-2ubuntu1UNKNOWN
ubuntu20.10noarchsquid< 4.9-2ubuntu1UNKNOWN
ubuntu21.04noarchsquid< 4.9-2ubuntu1UNKNOWN
ubuntu18.04noarchsquid3< 3.5.27-1ubuntu1.4UNKNOWN
ubuntu16.04noarchsquid3< 3.5.12-1ubuntu7.9UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.185 Low

EPSS

Percentile

96.2%