Bugzilla – Bug 1170313
VUL-0: CVE-2020-11945: squid: integer overflow bug allows credential replay and remote code execution attacks against HTTP Digest Authentication tokens
Last modified: 2022-10-18 09:36:29 UTC
CVE-2020-11945 Due to an integer overflow bug Squid is vulnerable to credential replay and remote code execution attacks against HTTP Digest Authentication tokens. References: https://www.openwall.com/lists/oss-security/2020/04/23/2 http://www.squid-cache.org/Advisories/SQUID-2020_4.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11945
Squid Proxy Cache Security Update Advisory SQUID-2020:4 __________________________________________________________________ Advisory ID: SQUID-2020:4 Date: April 23, 2020 Summary: Multiple issues in HTTP Digest authentication. Affected versions: Squid 2.x -> 2.7.STABLE9 Squid 3.x -> 3.5.28 Squid 4.x -> 4.10 Squid 5.x -> 5.0.1 Fixed in version: Squid 4.11 and 5.0.2 __________________________________________________________________ Severity: When memory pooling is used this problem allows a remote client to replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. When memory pooling is disabled this problem allows a remote client to perform remote code execution through the free'd nonce credentials. __________________________________________________________________ Updated Packages: This bug is fixed by Squid versions 4.11 and 5.0.2. In addition, patches addressing this problem for the stable releases can be found in our patch archives: Squid 4: <http://www.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch>
Workaround: Either, Remove all "auth_param digest" lines from squid.conf Or, Build Squid with --disable-auth-digest Or, Build Squid with --disable-auth
Squid appears to be affected in all supported code streams. SUSE:SLE-10-SP3:Update squid Affected [1] SUSE:SLE-11:Update squid Affected [1] SUSE:SLE-12:Update squid Affected [2] SUSE:SLE-12-SP2:Update squid Affected [3] SUSE:SLE-12-SP5:Update squid Affected [3] SUSE:SLE-15:Update squid Affected [3] The problematic function authDigestNonceLink() resides in the following sources: [1] ./src/auth/digest/auth_digest.c [2] ./src/auth/digest/auth_digest.cc [3] ./src/auth/digest/Config.cc
This is an autogenerated message for OBS integration: This bug (1170313) was mentioned in https://build.opensuse.org/request/show/796564 Factory / squid
SUSE-SU-2020:1134-1: An update that fixes 6 vulnerabilities is now available. Category: security (important) Bug References: 1162689,1162691,1167373,1169659,1170313 CVE References: CVE-2019-12519,CVE-2019-12521,CVE-2019-12528,CVE-2019-18860,CVE-2020-11945,CVE-2020-8517 Sources used: SUSE Linux Enterprise Server 12-SP5 (src): squid-4.11-4.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2020:1156-1: An update that fixes 6 vulnerabilities is now available. Category: security (important) Bug References: 1162689,1162691,1167373,1169659,1170313 CVE References: CVE-2019-12519,CVE-2019-12521,CVE-2019-12528,CVE-2019-18860,CVE-2020-11945,CVE-2020-8517 Sources used: SUSE Linux Enterprise Server for SAP 15 (src): squid-4.11-5.17.2 SUSE Linux Enterprise Server 15-LTSS (src): squid-4.11-5.17.2 SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): squid-4.11-5.17.2 SUSE Linux Enterprise Module for Server Applications 15-SP1 (src): squid-4.11-5.17.2 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): squid-4.11-5.17.2 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): squid-4.11-5.17.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2020:0623-1: An update that fixes 6 vulnerabilities is now available. Category: security (important) Bug References: 1162689,1162691,1167373,1169659,1170313 CVE References: CVE-2019-12519,CVE-2019-12521,CVE-2019-12528,CVE-2019-18860,CVE-2020-11945,CVE-2020-8517 Sources used: openSUSE Leap 15.1 (src): squid-4.11-lp151.2.15.2
SUSE-SU-2020:1227-1: An update that fixes 5 vulnerabilities is now available. Category: security (important) Bug References: 1169659,1170313,1170423 CVE References: CVE-2019-12519,CVE-2019-12520,CVE-2019-12521,CVE-2019-12524,CVE-2020-11945 Sources used: SUSE OpenStack Cloud Crowbar 8 (src): squid-3.5.21-26.23.1 SUSE OpenStack Cloud 8 (src): squid-3.5.21-26.23.1 SUSE OpenStack Cloud 7 (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server 12-SP4 (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): squid-3.5.21-26.23.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): squid-3.5.21-26.23.1 SUSE Enterprise Storage 5 (src): squid-3.5.21-26.23.1 HPE Helion Openstack 8 (src): squid-3.5.21-26.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2020:14460-1: An update that fixes 21 vulnerabilities is now available. Category: security (important) Bug References: 1140738,1141329,1141332,1156323,1156324,1156326,1156328,1156329,1162687,1162689,1162691,1167373,1169659,1170313,1170423,1173304,1173455 CVE References: CVE-2019-12519,CVE-2019-12520,CVE-2019-12521,CVE-2019-12523,CVE-2019-12524,CVE-2019-12525,CVE-2019-12526,CVE-2019-12528,CVE-2019-12529,CVE-2019-13345,CVE-2019-18676,CVE-2019-18677,CVE-2019-18678,CVE-2019-18679,CVE-2019-18860,CVE-2020-11945,CVE-2020-14059,CVE-2020-15049,CVE-2020-8449,CVE-2020-8450,CVE-2020-8517 JIRA References: Sources used: SUSE Linux Enterprise Server 11-SP4-LTSS (src): squid3-3.1.23-8.16.37.12.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): squid3-3.1.23-8.16.37.12.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): squid3-3.1.23-8.16.37.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.