CVE-2019-18679
high-risk
Published 2019-11-26
An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.
Do I need to act?
!
38.4% chance of exploitation in next 30 days
EPSS score — higher than 62% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (16)
Affected Vendors
References (22)
Third Party Advisory
http://www.squid-cache.org/Advisories/SQUID-2019_11.txt
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1156324
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html
Third Party Advisory
https://usn.ubuntu.com/4213-1/
Third Party Advisory
http://www.squid-cache.org/Advisories/SQUID-2019_11.txt
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1156324
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html
and 2 more references
61
/ 100
high-risk
Severity
26/34 · High
Exploitability
17/34 · Moderate
Exposure
18/34 · Moderate