Bug 1170313 - (CVE-2020-11945) VUL-0: CVE-2020-11945: squid: integer overflow bug allows credential replay and remote code execution attacks against HTTP Digest Authentication tokens
(CVE-2020-11945)
VUL-0: CVE-2020-11945: squid: integer overflow bug allows credential replay a...
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Adam Majer
Security Team bot
https://smash.suse.de/issue/258279/
CVSSv3.1:SUSE:CVE-2020-11945:8.8:(AV...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-04-23 10:01 UTC by Wolfgang Frisch
Modified: 2022-08-09 07:13 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
abergmann: needinfo? (amajer)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2020-04-23 10:01:13 UTC
CVE-2020-11945

Due to an integer overflow bug Squid is vulnerable to credential replay and remote code execution attacks against HTTP Digest Authentication tokens.

References:
https://www.openwall.com/lists/oss-security/2020/04/23/2
http://www.squid-cache.org/Advisories/SQUID-2020_4.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11945
Comment 1 Wolfgang Frisch 2020-04-23 10:03:44 UTC
    Squid Proxy Cache Security Update Advisory SQUID-2020:4
__________________________________________________________________

Advisory ID:        SQUID-2020:4
Date:               April 23, 2020
Summary:            Multiple issues
                    in HTTP Digest authentication.
Affected versions:  Squid 2.x -> 2.7.STABLE9
                    Squid 3.x -> 3.5.28
                    Squid 4.x -> 4.10
                    Squid 5.x -> 5.0.1
Fixed in version:   Squid 4.11 and 5.0.2
__________________________________________________________________

Severity:

 When memory pooling is used this problem allows a remote client
 to replay a sniffed Digest Authentication nonce to gain access
 to resources that are otherwise forbidden.

 When memory pooling is disabled this problem allows a remote
 client to perform remote code execution through the free'd nonce
 credentials.
__________________________________________________________________

Updated Packages:

 This bug is fixed by Squid versions 4.11 and 5.0.2.

 In addition, patches addressing this problem for the stable
 releases can be found in our patch archives:

Squid 4:
 <http://www.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch>
Comment 2 Wolfgang Frisch 2020-04-23 10:07:57 UTC
Workaround:

Either,
 Remove all "auth_param digest" lines from squid.conf
Or,
 Build Squid with --disable-auth-digest
Or,
 Build Squid with --disable-auth
Comment 3 Wolfgang Frisch 2020-04-23 10:37:02 UTC
Squid appears to be affected in all supported code streams.

SUSE:SLE-10-SP3:Update   squid     Affected [1]
SUSE:SLE-11:Update       squid     Affected [1]
SUSE:SLE-12:Update       squid     Affected [2]
SUSE:SLE-12-SP2:Update   squid     Affected [3]
SUSE:SLE-12-SP5:Update   squid     Affected [3]
SUSE:SLE-15:Update       squid     Affected [3]

The problematic function authDigestNonceLink() resides in the following sources:

[1] ./src/auth/digest/auth_digest.c
[2] ./src/auth/digest/auth_digest.cc
[3] ./src/auth/digest/Config.cc
Comment 4 Swamp Workflow Management 2020-04-23 14:30:16 UTC
This is an autogenerated message for OBS integration:
This bug (1170313) was mentioned in
https://build.opensuse.org/request/show/796564 Factory / squid
Comment 7 Swamp Workflow Management 2020-04-29 10:14:28 UTC
SUSE-SU-2020:1134-1: An update that fixes 6 vulnerabilities is now available.

Category: security (important)
Bug References: 1162689,1162691,1167373,1169659,1170313
CVE References: CVE-2019-12519,CVE-2019-12521,CVE-2019-12528,CVE-2019-18860,CVE-2020-11945,CVE-2020-8517
Sources used:
SUSE Linux Enterprise Server 12-SP5 (src):    squid-4.11-4.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Swamp Workflow Management 2020-04-30 13:17:46 UTC
SUSE-SU-2020:1156-1: An update that fixes 6 vulnerabilities is now available.

Category: security (important)
Bug References: 1162689,1162691,1167373,1169659,1170313
CVE References: CVE-2019-12519,CVE-2019-12521,CVE-2019-12528,CVE-2019-18860,CVE-2020-11945,CVE-2020-8517
Sources used:
SUSE Linux Enterprise Server for SAP 15 (src):    squid-4.11-5.17.2
SUSE Linux Enterprise Server 15-LTSS (src):    squid-4.11-5.17.2
SUSE Linux Enterprise Module for Server Applications 15-SP2 (src):    squid-4.11-5.17.2
SUSE Linux Enterprise Module for Server Applications 15-SP1 (src):    squid-4.11-5.17.2
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    squid-4.11-5.17.2
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    squid-4.11-5.17.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2020-05-11 09:11:30 UTC
openSUSE-SU-2020:0623-1: An update that fixes 6 vulnerabilities is now available.

Category: security (important)
Bug References: 1162689,1162691,1167373,1169659,1170313
CVE References: CVE-2019-12519,CVE-2019-12521,CVE-2019-12528,CVE-2019-18860,CVE-2020-11945,CVE-2020-8517
Sources used:
openSUSE Leap 15.1 (src):    squid-4.11-lp151.2.15.2
Comment 11 Swamp Workflow Management 2020-05-11 09:29:14 UTC
SUSE-SU-2020:1227-1: An update that fixes 5 vulnerabilities is now available.

Category: security (important)
Bug References: 1169659,1170313,1170423
CVE References: CVE-2019-12519,CVE-2019-12520,CVE-2019-12521,CVE-2019-12524,CVE-2020-11945
Sources used:
SUSE OpenStack Cloud Crowbar 8 (src):    squid-3.5.21-26.23.1
SUSE OpenStack Cloud 8 (src):    squid-3.5.21-26.23.1
SUSE OpenStack Cloud 7 (src):    squid-3.5.21-26.23.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    squid-3.5.21-26.23.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    squid-3.5.21-26.23.1
SUSE Linux Enterprise Server 12-SP4 (src):    squid-3.5.21-26.23.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    squid-3.5.21-26.23.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    squid-3.5.21-26.23.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    squid-3.5.21-26.23.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    squid-3.5.21-26.23.1
SUSE Enterprise Storage 5 (src):    squid-3.5.21-26.23.1
HPE Helion Openstack 8 (src):    squid-3.5.21-26.23.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Swamp Workflow Management 2020-08-24 16:14:51 UTC
SUSE-SU-2020:14460-1: An update that fixes 21 vulnerabilities is now available.

Category: security (important)
Bug References: 1140738,1141329,1141332,1156323,1156324,1156326,1156328,1156329,1162687,1162689,1162691,1167373,1169659,1170313,1170423,1173304,1173455
CVE References: CVE-2019-12519,CVE-2019-12520,CVE-2019-12521,CVE-2019-12523,CVE-2019-12524,CVE-2019-12525,CVE-2019-12526,CVE-2019-12528,CVE-2019-12529,CVE-2019-13345,CVE-2019-18676,CVE-2019-18677,CVE-2019-18678,CVE-2019-18679,CVE-2019-18860,CVE-2020-11945,CVE-2020-14059,CVE-2020-15049,CVE-2020-8449,CVE-2020-8450,CVE-2020-8517
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS (src):    squid3-3.1.23-8.16.37.12.1
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    squid3-3.1.23-8.16.37.12.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    squid3-3.1.23-8.16.37.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.