Debian LTS: DLA-2028-1: squid3 security update

    Date10 Dec 2019
    CategoryDebian LTS
    Posted ByLinuxSecurity Advisories
    It was found that Squid, a high-performance proxy caching server for web clients, has been affected by the following security vulnerabilities.
    Package        : squid3
    Version        : 3.4.8-6+deb8u9
    CVE ID         : CVE-2019-12526 CVE-2019-18677 CVE-2019-18678
    It was found that Squid, a high-performance proxy caching server for
    web clients, has been affected by the following security
         URN response handling in Squid suffers from a heap-based buffer
         overflow. When receiving data from a remote server in response to
         an URN request, Squid fails to ensure that the response can fit
         within the buffer. This leads to attacker controlled data
         overflowing in the heap.
         When the append_domain setting is used (because the appended
         characters do not properly interact with hostname length
         restrictions), it can inappropriately redirect traffic to origins
         it should not be delivered to. This happens because of incorrect
         message processing.
         A programming error allows attackers to smuggle HTTP requests
         through frontend software to a Squid instance that splits the HTTP
         Request pipeline differently. The resulting Response messages
         corrupt caches (between a client and Squid) with
         attacker-controlled content at arbitrary URLs. Effects are isolated
         to software between the attacker client and Squid.
         There are no effects on Squid itself, nor on any upstream servers.
         The issue is related to a request header containing whitespace
         between a header name and a colon.
         Due to incorrect data management, Squid is vulnerable to
         information disclosure when processing HTTP Digest Authentication.
         Nonce tokens contain the raw byte value of a pointer that sits
         within heap memory allocation. This information reduces ASLR
         protections and may aid attackers isolating memory areas to target
         for remote code execution attacks.
    For Debian 8 "Jessie", these problems have been fixed in version
    We recommend that you upgrade your squid3 packages.
    Further information about Debian LTS security advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at:
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"82","type":"x","order":"1","pct":56.16,"resources":[]},{"id":"88","title":"Should be more technical","votes":"22","type":"x","order":"2","pct":15.07,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"42","type":"x","order":"3","pct":28.77,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.