CVE-2019-18679

Source
https://cve.org/CVERecord?id=CVE-2019-18679
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-18679.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-18679
Downstream
Related
Published
2019-11-26T17:15:13.047Z
Modified
2026-05-15T12:03:52.107974361Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
            ],
            "vendor_product": "canonical:ubuntu_linux",
            "extracted_events": [
                {
                    "last_affected": "16.04"
                },
                {
                    "last_affected": "18.04"
                },
                {
                    "last_affected": "19.04"
                },
                {
                    "last_affected": "19.10"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "debian:debian_linux",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
            ],
            "vendor_product": "fedoraproject:fedora",
            "extracted_events": [
                {
                    "last_affected": "30"
                },
                {
                    "last_affected": "31"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
                "cpe:2.3:a:squid-cache:squid:2.7:stable2:*:*:*:*:*:*",
                "cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:*",
                "cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:*",
                "cpe:2.3:a:squid-cache:squid:2.7:stable5:*:*:*:*:*:*",
                "cpe:2.3:a:squid-cache:squid:2.7:stable6:*:*:*:*:*:*",
                "cpe:2.3:a:squid-cache:squid:2.7:stable7:*:*:*:*:*:*",
                "cpe:2.3:a:squid-cache:squid:2.7:stable8:*:*:*:*:*:*",
                "cpe:2.3:a:squid-cache:squid:2.7:stable9:*:*:*:*:*:*"
            ],
            "vendor_product": "squid-cache:squid",
            "extracted_events": [
                {
                    "introduced": "2.0"
                },
                {
                    "last_affected": "2.7"
                },
                {
                    "last_affected": "2.7-stable2"
                },
                {
                    "last_affected": "2.7-stable3"
                },
                {
                    "last_affected": "2.7-stable4"
                },
                {
                    "last_affected": "2.7-stable5"
                },
                {
                    "last_affected": "2.7-stable6"
                },
                {
                    "last_affected": "2.7-stable7"
                },
                {
                    "last_affected": "2.7-stable8"
                },
                {
                    "last_affected": "2.7-stable9"
                }
            ]
        }
    ]
}
References

Affected packages