Описание
Security update for squid
This update for squid fixes the following issues:
Security issue fixed:
- CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
- CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
Список пакетов
SUSE Enterprise Storage 4
SUSE Enterprise Storage 5
SUSE Linux Enterprise Server 12 SP2-BCL
SUSE Linux Enterprise Server 12 SP2-LTSS
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server 12 SP4
SUSE Linux Enterprise Server for SAP Applications 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12 SP3
SUSE Linux Enterprise Server for SAP Applications 12 SP4
SUSE OpenStack Cloud 7
SUSE OpenStack Cloud 8
Ссылки
- Link for SUSE-SU-2019:2089-1
- E-Mail link for SUSE-SU-2019:2089-1
- SUSE Security Ratings
- SUSE Bug 1140738
- SUSE Bug 1141329
- SUSE Bug 1141332
- SUSE CVE CVE-2019-12525 page
- SUSE CVE CVE-2019-12529 page
- SUSE CVE CVE-2019-13345 page
Описание
An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1.
Затронутые продукты
Ссылки
- CVE-2019-12525
- SUSE Bug 1141332
Описание
An issue was discovered in Squid 2.x through 2.7.STABLE9, 3.x through 3.5.28, and 4.x through 4.7. When Squid is configured to use Basic Authentication, the Proxy-Authorization header is parsed via uudecode. uudecode determines how many bytes will be decoded by iterating over the input and checking its table. The length is then used to start decoding the string. There are no checks to ensure that the length it calculates isn't greater than the input buffer. This leads to adjacent memory being decoded as well. An attacker would not be able to retrieve the decoded data unless the Squid maintainer had configured the display of usernames on error pages.
Затронутые продукты
Ссылки
- CVE-2019-12529
- SUSE Bug 1141329
Описание
The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.
Затронутые продукты
Ссылки
- CVE-2019-13345
- SUSE Bug 1140738