[USN-4289-1] Squid vulnerabilities
Several security issues were fixed in Squid.
Jeriko One discovered that Squid incorrectly handled memory when connected
to an FTP server. A remote attacker could possibly use this issue to obtain
sensitive information from Squid memory. (CVE-2019-12528)
Regis Leroy discovered that Squid incorrectly handled certain HTTP
requests. A remote attacker could possibly use this issue to access server
resources prohibited by earlier security filters. (CVE-2020-8449)
Guido Vranken discovered that Squid incorrectly handled certain buffer
operations when acting as a reverse proxy. A remote attacker could use
this issue to cause Squid to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2020-8450)
Aaron Costello discovered that Squid incorrectly handled certain NTLM
authentication credentials. A remote attacker could possibly use this issue
to cause Squid to crash, resulting in a denial of service. (CVE-2020-8517)
- ID
- USN-4289-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4289-1
- Published
-
2020-02-20T15:17:45
(4 years ago) - Modified
-
2020-02-20T15:17:45
(4 years ago) - Other Advisories
-
- ALAS-2020-1453
- ALAS-2023-1766
- ALAS2-2020-1486
- ALAS2-2023-2062
- ALPINE:CVE-2019-12528
- ALPINE:CVE-2020-8449
- ALPINE:CVE-2020-8450
- ALPINE:CVE-2020-8517
- ALSA-2020:4743
- DSA-4682-1
- ELSA-2020-4082
- FEDORA-2020-56e809930e
- FEDORA-2020-790296a8f4
- FEDORA-2020-ab8e7463ab
- FREEBSD:57C1C2EE-7914-11EA-90BF-0800276545C1
- GLSA-202003-34
- openSUSE-SU-2020:0307-1
- openSUSE-SU-2020:0606-1
- openSUSE-SU-2020:0623-1
- RHSA-2020:4082
- RHSA-2020:4743
- RLSA-2020:4743
- SUSE-SU-2020:0487-1
- SUSE-SU-2020:0493-1
- SUSE-SU-2020:0661-1
- SUSE-SU-2020:1134-1
- SUSE-SU-2020:1156-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/squidclient?distro=xenial | ubuntu | squidclient | < 3.5.12-1ubuntu7.10 | xenial | ||
Affected | pkg:deb/ubuntu/squidclient?distro=eoan | ubuntu | squidclient | < 4.8-1ubuntu2.2 | eoan | ||
Affected | pkg:deb/ubuntu/squidclient?distro=bionic | ubuntu | squidclient | < 3.5.27-1ubuntu1.5 | bionic | ||
Affected | pkg:deb/ubuntu/squid?distro=xenial | ubuntu | squid | < 3.5.12-1ubuntu7.10 | xenial | ||
Affected | pkg:deb/ubuntu/squid?distro=eoan | ubuntu | squid | < 4.8-1ubuntu2.2 | eoan | ||
Affected | pkg:deb/ubuntu/squid?distro=bionic | ubuntu | squid | < 3.5.27-1ubuntu1.5 | bionic | ||
Affected | pkg:deb/ubuntu/squid3?distro=xenial | ubuntu | squid3 | < 3.5.12-1ubuntu7.10 | xenial | ||
Affected | pkg:deb/ubuntu/squid3?distro=eoan | ubuntu | squid3 | < 4.8-1ubuntu2.2 | eoan | ||
Affected | pkg:deb/ubuntu/squid3?distro=bionic | ubuntu | squid3 | < 3.5.27-1ubuntu1.5 | bionic | ||
Affected | pkg:deb/ubuntu/squid-purge?distro=xenial | ubuntu | squid-purge | < 3.5.12-1ubuntu7.10 | xenial | ||
Affected | pkg:deb/ubuntu/squid-purge?distro=eoan | ubuntu | squid-purge | < 4.8-1ubuntu2.2 | eoan | ||
Affected | pkg:deb/ubuntu/squid-purge?distro=bionic | ubuntu | squid-purge | < 3.5.27-1ubuntu1.5 | bionic | ||
Affected | pkg:deb/ubuntu/squid-common?distro=xenial | ubuntu | squid-common | < 3.5.12-1ubuntu7.10 | xenial | ||
Affected | pkg:deb/ubuntu/squid-common?distro=eoan | ubuntu | squid-common | < 4.8-1ubuntu2.2 | eoan | ||
Affected | pkg:deb/ubuntu/squid-common?distro=bionic | ubuntu | squid-common | < 3.5.27-1ubuntu1.5 | bionic | ||
Affected | pkg:deb/ubuntu/squid-cgi?distro=xenial | ubuntu | squid-cgi | < 3.5.12-1ubuntu7.10 | xenial | ||
Affected | pkg:deb/ubuntu/squid-cgi?distro=eoan | ubuntu | squid-cgi | < 4.8-1ubuntu2.2 | eoan | ||
Affected | pkg:deb/ubuntu/squid-cgi?distro=bionic | ubuntu | squid-cgi | < 3.5.27-1ubuntu1.5 | bionic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |