Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:2089-1

Опубликовано: 08 авг. 2019
Источник: suse-cvrf

Описание

Security update for squid

This update for squid fixes the following issues:

Security issue fixed:

  • CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
  • CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
  • CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).

Список пакетов

SUSE Enterprise Storage 4
squid-3.5.21-26.17.1
SUSE Enterprise Storage 5
squid-3.5.21-26.17.1
SUSE Linux Enterprise Server 12 SP2-BCL
squid-3.5.21-26.17.1
SUSE Linux Enterprise Server 12 SP2-LTSS
squid-3.5.21-26.17.1
SUSE Linux Enterprise Server 12 SP3-BCL
squid-3.5.21-26.17.1
SUSE Linux Enterprise Server 12 SP3-LTSS
squid-3.5.21-26.17.1
SUSE Linux Enterprise Server 12 SP4
squid-3.5.21-26.17.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
squid-3.5.21-26.17.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
squid-3.5.21-26.17.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
squid-3.5.21-26.17.1
SUSE OpenStack Cloud 7
squid-3.5.21-26.17.1
SUSE OpenStack Cloud 8
squid-3.5.21-26.17.1

Описание

An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1.


Затронутые продукты
SUSE Enterprise Storage 4:squid-3.5.21-26.17.1
SUSE Enterprise Storage 5:squid-3.5.21-26.17.1
SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.17.1
SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.17.1

Ссылки

Описание

An issue was discovered in Squid 2.x through 2.7.STABLE9, 3.x through 3.5.28, and 4.x through 4.7. When Squid is configured to use Basic Authentication, the Proxy-Authorization header is parsed via uudecode. uudecode determines how many bytes will be decoded by iterating over the input and checking its table. The length is then used to start decoding the string. There are no checks to ensure that the length it calculates isn't greater than the input buffer. This leads to adjacent memory being decoded as well. An attacker would not be able to retrieve the decoded data unless the Squid maintainer had configured the display of usernames on error pages.


Затронутые продукты
SUSE Enterprise Storage 4:squid-3.5.21-26.17.1
SUSE Enterprise Storage 5:squid-3.5.21-26.17.1
SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.17.1
SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.17.1

Ссылки

Описание

The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.


Затронутые продукты
SUSE Enterprise Storage 4:squid-3.5.21-26.17.1
SUSE Enterprise Storage 5:squid-3.5.21-26.17.1
SUSE Linux Enterprise Server 12 SP2-BCL:squid-3.5.21-26.17.1
SUSE Linux Enterprise Server 12 SP2-LTSS:squid-3.5.21-26.17.1

Ссылки
Уязвимость SUSE-SU-2019:2089-1