MEDIUM · 5.9

CVE-2019-12521

An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement...

Vulnerability Description

An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.

CVSS Score

5.9

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
Squid-CacheSquid>= 3.0, <= 3.5.28
CanonicalUbuntu Linux16.04
DebianDebian Linux9.0
OpensuseLeap15.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-12521?

CVE-2019-12521 is a vulnerability with a CVSS score of 5.9 (MEDIUM). An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement...

How severe is CVE-2019-12521?

CVE-2019-12521 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-12521?

Check the references section above for vendor advisories and patch information. Affected products include: Squid-Cache Squid, Canonical Ubuntu Linux, Debian Debian Linux, Opensuse Leap.