HTTP: Squid Proxy URN Response Processing Heap Buffer Overflow
This signature detects attempts to exploit a known vulnerability against Squid Proxy. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the squid process.
Extended Description
An issue was discovered in Squid before 4.9. URN response handling in Squid suffers from a heap-based buffer overflow. When receiving data from a remote server in response to an URN request, Squid fails to ensure that the response can fit within the buffer. This leads to attacker controlled data overflowing in the heap.
Affected Products
Debian debian_linux
References
CVE: CVE-2019-12526
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Opensuse
Fedoraproject
Squid-cache
Debian
Canonical
7.5