|
|||
Rule General Information |
---|
Release Date: | 2020-08-24 | |
Rule Name: | Squid Proxy Digest Authentication Denial of Service Vulnerability (CVE-2019-12525) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1. | |
Impact: | An attacker can launch a denial of service attack by exploiting the vulnerability successfully. | |
Affected OS: | Windows, Others | |
Reference: | http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html http://www.squid-cache.org/Versions/v4/changesets/ http://www.squid-cache.org/Versions/v4/changesets/squid-4-7f73e9c5d17664b882ed32590e6af310c247f320.patch |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://github.com/squid-cache/squid/commits/v4 |