Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:146995
[Eng]
Version
2
Class
patch
ALTXid
347478
Language
Russian
Severity
Critical
Title
ALT -- Обновление squid-4.13-alt1
Description
Исправление CVE-2019-12519, CVE-2019-12521, CVE-2020-11945,
CVE-2020-14058, CVE-2020-14059, CVE-2020-15049, CVE-2020-15810, CVE-2020-15811, CVE-2020-24606
Family
unix
Platform
ALT 8 SP
Product
squid
Reference
VENDOR: otchet-po-obnovleniiam-ot-27102020
VENDOR: otchet-po-obnovleniiam-ot-27102020
Id:
otchet-po-obnovleniiam-ot-27102020
Reference:
https://cve.basealt.ru/otchet-po-obnovleniiam-ot-27102020.html
CVE: CVE-2019-12519
CVE: CVE-2019-12519
Id:
CVE-2019-12519
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12519
Comment
: An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expression, it could either evaluate the top of the stack, or add a new member to the stack. When adding a new member, there is no check to ensure that the stack won't overflow.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
787 (Out-of-bounds Write)
References:
https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12519.txt (MISC)
[oss-security] 20200423 [ADVISORY] SQUID-2019:12 Multiple issues in ESI Response processing (MLIST)
DSA-4682 (DEBIAN)
openSUSE-SU-2020:0623 (SUSE)
GLSA-202005-05 (GENTOO)
USN-4356-1 (UBUNTU)
[debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update (MLIST)
https://security.netapp.com/advisory/ntap-20210205-0006/ (CONFIRM)
CVE: CVE-2019-12521
CVE: CVE-2019-12521
Id:
CVE-2019-12521
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12521
Comment
: An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSSv3 Score:
5.9
Attack vector:
NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
787 (Out-of-bounds Write)
References:
https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12521.txt (MISC)
[oss-security] 20200423 [ADVISORY] SQUID-2019:12 Multiple issues in ESI Response processing (MLIST)
DSA-4682 (DEBIAN)
openSUSE-SU-2020:0623 (SUSE)
GLSA-202005-05 (GENTOO)
USN-4356-1 (UBUNTU)
[debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update (MLIST)
https://security.netapp.com/advisory/ntap-20210205-0006/ (CONFIRM)
CVE: CVE-2020-11945
CVE: CVE-2020-11945
Id:
CVE-2020-11945
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11945
Comment
: An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials).
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
190 (Integer Overflow or Wraparound)
References:
https://github.com/squid-cache/squid/commit/eeebf0f37a72a2de08348e85ae34b02c34e9a811 (MISC)
http://www.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch (MISC)
http://master.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch (MISC)
https://github.com/squid-cache/squid/pull/585 (MISC)
http://www.openwall.com/lists/oss-security/2020/04/23/2 (CONFIRM)
https://bugzilla.suse.com/show_bug.cgi?id=1170313 (CONFIRM)
DSA-4682 (DEBIAN)
openSUSE-SU-2020:0623 (SUSE)
GLSA-202005-05 (GENTOO)
USN-4356-1 (UBUNTU)
[debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update (MLIST)
https://security.netapp.com/advisory/ntap-20210304-0004/ (CONFIRM)
FEDORA-2020-848065cc4c ()
FEDORA-2020-a6a921a591 ()
FEDORA-2020-56e809930e ()
CVE: CVE-2020-14058
CVE: CVE-2020-14058
Id:
CVE-2020-14058
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14058
Comment
: An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to use of a potentially dangerous function, Squid and the default certificate validation helper are vulnerable to a Denial of Service when opening a TLS connection to an attacker-controlled server for HTTPS. This occurs because unrecognized error values are mapped to NULL, but later code expects that each error value is mapped to a valid error string.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
http://www.squid-cache.org/Versions/v4/changesets/squid-4-93f5fda134a2a010b84ffedbe833d670e63ba4be.patch (MISC)
http://www.squid-cache.org/Advisories/SQUID-2020_6.txt (CONFIRM)
http://www.squid-cache.org/Versions/v5/changesets/squid-5-c6d1a4f6a2cbebceebc8a3fcd8f539ceb7b7f723.patch (MISC)
https://security.netapp.com/advisory/ntap-20210312-0001/ (CONFIRM)
FEDORA-2020-cbebc5617e ()
CVE: CVE-2020-14059
CVE: CVE-2020-14059
Id:
CVE-2020-14059
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14059
Comment
: An issue was discovered in Squid 5.x before 5.0.3. Due to an Incorrect Synchronization, a Denial of Service can occur when processing objects in an SMP cache because of an Ipc::Mem::PageStack::pop ABA problem during access to the memory page/slot management list.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
662 (Improper Synchronization)
References:
http://www.squid-cache.org/Versions/v5/changesets/squid-5-7a5af8db8e0377c06ed9ffbdcb1334389c7cd8ab.patch (MISC)
http://www.squid-cache.org/Advisories/SQUID-2020_5.txt (CONFIRM)
https://security.netapp.com/advisory/ntap-20210312-0001/ (CONFIRM)
CVE: CVE-2020-15049
CVE: CVE-2020-15049
Id:
CVE-2020-15049
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15049
Comment
: An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
CVSSv2 Score:
6.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
444 (Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling'))
References:
http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch (MISC)
https://github.com/squid-cache/squid/security/advisories/GHSA-qf3v-rc95-96j5 (CONFIRM)
http://www.squid-cache.org/Versions/v5/changesets/squid-5-485c9a7bb1bba88754e07ad0094647ea57a6eb8d.patch (MISC)
DSA-4732 (DEBIAN)
openSUSE-SU-2020:1346 (SUSE)
openSUSE-SU-2020:1369 (SUSE)
USN-4551-1 (UBUNTU)
[debian-lts-announce] 20201002 [SECURITY] [DLA 2394-1] squid3 security update (MLIST)
https://security.netapp.com/advisory/ntap-20210312-0001/ (CONFIRM)
FEDORA-2020-cbebc5617e ()
CVE: CVE-2020-15810
CVE: CVE-2020-15810
Id:
CVE-2020-15810
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15810
Comment
: An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
CVSSv2 Score:
3.5
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CWE:
444 (Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling'))
References:
DSA-4751 (DEBIAN)
USN-4477-1 (UBUNTU)
https://github.com/squid-cache/squid/security/advisories/GHSA-3365-q9qx-f98m (MISC)
openSUSE-SU-2020:1346 (SUSE)
openSUSE-SU-2020:1369 (SUSE)
USN-4551-1 (UBUNTU)
[debian-lts-announce] 20201002 [SECURITY] [DLA 2394-1] squid3 security update (MLIST)
https://security.netapp.com/advisory/ntap-20210219-0007/ (CONFIRM)
https://security.netapp.com/advisory/ntap-20210226-0006/ (CONFIRM)
https://security.netapp.com/advisory/ntap-20210226-0007/ (CONFIRM)
FEDORA-2020-73af8655eb ()
FEDORA-2020-63f3bd656e ()
FEDORA-2020-6c58bff862 ()
CVE: CVE-2020-15811
CVE: CVE-2020-15811
Id:
CVE-2020-15811
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15811
Comment
: An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:N
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CWE:
697 (Insufficient Comparison)
References:
DSA-4751 (DEBIAN)
https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv (MISC)
USN-4477-1 (UBUNTU)
openSUSE-SU-2020:1346 (SUSE)
openSUSE-SU-2020:1369 (SUSE)
USN-4551-1 (UBUNTU)
[debian-lts-announce] 20201002 [SECURITY] [DLA 2394-1] squid3 security update (MLIST)
https://security.netapp.com/advisory/ntap-20210219-0007/ (CONFIRM)
https://security.netapp.com/advisory/ntap-20210226-0007/ (CONFIRM)
https://security.netapp.com/advisory/ntap-20210226-0006/ (CONFIRM)
FEDORA-2020-73af8655eb ()
FEDORA-2020-63f3bd656e ()
FEDORA-2020-6c58bff862 ()
CVE: CVE-2020-24606
CVE: CVE-2020-24606
Id:
CVE-2020-24606
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24606
Comment
: Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
CVSSv2 Score:
7.1
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
667 (Improper Locking)
References:
http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch (MISC)
https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg (MISC)
DSA-4751 (DEBIAN)
USN-4477-1 (UBUNTU)
openSUSE-SU-2020:1346 (SUSE)
openSUSE-SU-2020:1369 (SUSE)
USN-4551-1 (UBUNTU)
[debian-lts-announce] 20201002 [SECURITY] [DLA 2394-1] squid3 security update (MLIST)
https://security.netapp.com/advisory/ntap-20210219-0007/ (CONFIRM)
https://security.netapp.com/advisory/ntap-20210226-0006/ (CONFIRM)
https://security.netapp.com/advisory/ntap-20210226-0007/ (CONFIRM)
FEDORA-2020-73af8655eb ()
FEDORA-2020-63f3bd656e ()
FEDORA-2020-6c58bff862 ()
Content available only for registered users!
ovaldb@altx-soft.com