{ "schema_version": "1.4.0", "id": "GHSA-chw7-jm99-chw8", "modified": "2023-03-03T15:30:24Z", "published": "2022-05-24T17:02:15Z", "aliases": [ "CVE-2019-18676" ], "details": "An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18676" }, { "type": "WEB", "url": "https://github.com/squid-cache/squid/pull/275" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1156329" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4213-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4446-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2020/dsa-4682" }, { "type": "WEB", "url": "http://www.squid-cache.org/Advisories/SQUID-2019_8.txt" }, { "type": "WEB", "url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch" } ], "database_specific": { "cwe_ids": [ "CWE-787" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-11-26T17:15:00Z" } }