9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
Squid is vulnerable to denial of service (DoS). Parsing of header Proxy-Authentication leads to memory corruption.
CPE | Name | Operator | Version |
---|---|---|---|
squid | eq | 3.5.20__12.el7_6.1 | |
squid3:stretch | eq | 3.5.23-5+deb9u1 | |
squid | eq | 3.5.20__12.el7_6.1 | |
squid3:stretch | eq | 3.5.23-5+deb9u1 |
lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html
lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html
www.squid-cache.org/Versions/v4/changesets/
www.squid-cache.org/Versions/v4/changesets/squid-4-7f73e9c5d17664b882ed32590e6af310c247f320.patch
access.redhat.com/errata/RHSA-2020:2040
access.redhat.com/security/updates/classification/#important
github.com/squid-cache/squid/commits/v4
lists.debian.org/debian-lts-announce/2019/07/msg00018.html
lists.debian.org/debian-lts-announce/2020/07/msg00009.html
lists.fedoraproject.org/archives/list/[email protected]/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/
seclists.org/bugtraq/2019/Aug/42
usn.ubuntu.com/4065-1/
usn.ubuntu.com/4065-2/
www.debian.org/security/2019/dsa-4507
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P