Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-12521

Опубликовано: 15 апр. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.9

Описание

An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.

РелизСтатусПримечание
bionic

DNE

devel

released

4.10-1ubuntu2
eoan

released

4.8-1ubuntu2.3
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

4.10-1ubuntu1.1
focal

released

4.10-1ubuntu1.1
groovy

released

4.10-1ubuntu2
hirsute

released

4.10-1ubuntu2
precise/esm

DNE

trusty

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

released

3.5.27-1ubuntu1.6
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

3.5.27-1ubuntu1.6
esm-infra/focal

DNE

esm-infra/xenial

not-affected

3.5.12-1ubuntu7.11
focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

EPSS

Процентиль: 57%
0.0036
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
около 5 лет назад

An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.

CVSS3: 5.9
nvd
около 5 лет назад

An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.

CVSS3: 5.9
debian
около 5 лет назад

An issue was discovered in Squid through 4.7. When Squid is parsing ES ...

github
около 3 лет назад

An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.

CVSS3: 5.9
fstec
около 5 лет назад

Уязвимость механизма обработки элементов ESI прокси-сервера Squid, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 57%
0.0036
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Уязвимость CVE-2019-12521