Due to incorrect buffer management Squid is vulnerable to a heap overflow and possible remote code execution attack when processing URN. References: http://www.squid-cache.org/Advisories/SQUID-2019_7.txt
Created squid tracking bugs for this issue: Affects: fedora-all [bug 1770357]
External References: http://www.squid-cache.org/Advisories/SQUID-2019_7.txt
Mitigation: The following mitigation is suggested by upstream: Deny urn: protocol URI being proxied to all clients: ~~~ acl URN proto URN http_access deny URN ~~~
Analysis: This is a heap-based buffer overflow, which can be triggered by a malicious client. The client can overwrite substantial amount of heap potentially causing squid to crash or even execute arbitrary code with the permissions of the user running squid (normally squid user which is non-privileged). Also on Red Hat Products, squid is confined with selinux which should reduce the possibilities of code execution. Because of the above mentioned difficulties in exploitation, Red Hat Product Security has classified this flaw as having Moderate impact.
Statement: This is a heap-based buffer overflow, which can be triggered by a malicious client. The client can overwrite substantial amount of heap potentially causing squid to crash or even execute arbitrary code with the permissions of the user running squid (normally squid user which is non-privileged). Also on Red Hat Products, squid is confined with selinux which should reduce the possibilities of code execution. Because of the above mentioned difficulties in exploitation, Red Hat Product Security has classified this flaw as having Moderate impact.
Upstream patch: http://www.squid-cache.org/Versions/v4/changesets/squid-4-7aa0184a720fd216191474e079f4fe87de7c4f5a.patch
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-12526
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4743 https://access.redhat.com/errata/RHSA-2020:4743