[prev in list] [next in list] [prev in thread] [next in thread]
List: ubuntu-security-announce
Subject: [USN-4213-1] Squid vulnerabilities
From: Marc Deslauriers <marc.deslauriers () canonical ! com>
Date: 2019-12-04 18:19:10
Message-ID: d57c5bc8-3807-2f5c-a450-a8bd6a806487 () canonical ! com
[Download RAW message or body]
[Attachment #2 (multipart/signed)]
[Attachment #4 (multipart/mixed)]
==========================================================================
Ubuntu Security Notice USN-4213-1
December 04, 2019
squid, squid3 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.10
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Squid.
Software Description:
- squid: Web proxy cache server
- squid3: Web proxy cache server
Details:
Jeriko One and Kristoffer Danielsson discovered that Squid incorrectly
handled certain URN requests. A remote attacker could possibly use this
issue to bypass access checks and access restricted servers. This issue was
only addressed in Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-12523)
Jeriko One discovered that Squid incorrectly handed URN responses. A remote
attacker could use this issue to cause Squid to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2019-12526)
Alex Rousskov discovered that Squid incorrectly handled certain strings. A
remote attacker could possibly use this issue to cause Squid to crash,
resulting in a denial of service. This issue only affected Ubuntu 19.04.
(CVE-2019-12854)
Jeriko One and Kristoffer Danielsson discovered that Squid incorrectly
handled certain input. A remote attacker could use this issue to cause
Squid to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue was only addressed in Ubuntu 19.04 and Ubuntu
19.10. (CVE-2019-18676)
Kristoffer Danielsson discovered that Squid incorrectly handled certain
messages. This issue could result in traffic being redirected to origins
it should not be delivered to. (CVE-2019-18677)
RĂ©gis Leroy discovered that Squid incorrectly handled certain HTTP
request headers. A remote attacker could use this to smuggle HTTP requests
and corrupt caches with arbitrary content. (CVE-2019-18678)
David Fifield discovered that Squid incorrectly handled HTTP Digest
Authentication. A remote attacker could possibly use this issue to obtain
pointer contents and bypass ASLR protections. (CVE-2019-18679)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.10:
squid 4.8-1ubuntu2.1
Ubuntu 19.04:
squid 4.4-1ubuntu2.3
Ubuntu 18.04 LTS:
squid3 3.5.27-1ubuntu1.4
Ubuntu 16.04 LTS:
squid3 3.5.12-1ubuntu7.9
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4213-1
CVE-2019-12523, CVE-2019-12526, CVE-2019-12854, CVE-2019-18676,
CVE-2019-18677, CVE-2019-18678, CVE-2019-18679
Package Information:
https://launchpad.net/ubuntu/+source/squid/4.8-1ubuntu2.1
https://launchpad.net/ubuntu/+source/squid/4.4-1ubuntu2.3
https://launchpad.net/ubuntu/+source/squid3/3.5.27-1ubuntu1.4
https://launchpad.net/ubuntu/+source/squid3/3.5.12-1ubuntu7.9
["signature.asc" (application/pgp-signature)]
[Attachment #8 (text/plain)]
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic