CVE-2019-12525
high-risk
Published 2019-07-11
An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1.
Do I need to act?
!
55.2% chance of exploitation in next 30 days
EPSS score — higher than 45% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (11)
Affected Vendors
References (24)
Vendor Advisory
http://www.squid-cache.org/Versions/v4/changesets/
Mailing List
https://seclists.org/bugtraq/2019/Aug/42
Third Party Advisory
https://usn.ubuntu.com/4065-1/
Third Party Advisory
https://usn.ubuntu.com/4065-2/
Third Party Advisory
https://www.debian.org/security/2019/dsa-4507
Vendor Advisory
http://www.squid-cache.org/Versions/v4/changesets/
and 4 more references
66
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
18/34 · Moderate
Exposure
16/34 · Moderate