Show plain JSON{"id": "CVE-2019-12529", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.2}]}, "published": "2019-07-11T19:15:13.157", "references": [{"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.squid-cache.org/Versions/v4/changesets/", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-dd46b5417809647f561d8a5e0e74c3aacd235258.patch", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/squid-cache/squid/commits/v4", "tags": ["Patch", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00018.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/", "source": "cve@mitre.org"}, {"url": "https://seclists.org/bugtraq/2019/Aug/42", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://usn.ubuntu.com/4065-1/", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://usn.ubuntu.com/4065-2/", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.debian.org/security/2019/dsa-4507", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-125"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Squid 2.x through 2.7.STABLE9, 3.x through 3.5.28, and 4.x through 4.7. When Squid is configured to use Basic Authentication, the Proxy-Authorization header is parsed via uudecode. uudecode determines how many bytes will be decoded by iterating over the input and checking its table. The length is then used to start decoding the string. There are no checks to ensure that the length it calculates isn't greater than the input buffer. This leads to adjacent memory being decoded as well. An attacker would not be able to retrieve the decoded data unless the Squid maintainer had configured the display of usernames on error pages."}, {"lang": "es", "value": "Se detect\u00f3 un problema en Squid versiones 2.x hasta 2.7.STABLE9, versiones 3.x hasta 3.5.28 y versiones 4.x hasta 4.7. Cuando Squid se configura para utilizar la autenticaci\u00f3n b\u00e1sica, el encabezado Proxy-Authorization se analiza por medio de uudecode. uudecode determina cu\u00e1ntos bytes se descodificar\u00e1n mediante la iteraci\u00f3n sobre la entrada y comprobando su tabla. A continuaci\u00f3n, la longitud se utiliza para empezar a decodificar la cadena. No hay comprobaciones para asegurarse de que la longitud que calcula no es mayor que el b\u00fafer de entrada. Esto conlleva a que la memoria adyacente esta siendo decodificada tambi\u00e9n. Un atacante no podr\u00eda recuperar los datos descodificados a menos que el mantenedor de Squid haya configurado la visualizaci\u00f3n de nombres de usuario en las p\u00e1ginas de error."}], "lastModified": "2023-11-07T03:03:37.920", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E2C5F7C-FADE-4A8C-8A7D-7597874B6C9A", "versionEndExcluding": "2.7", "versionStartIncluding": "2.0"}, {"criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC9F2659-B37B-4E7B-AE40-B91BF3CE4E88", "versionEndIncluding": "3.5.28", "versionStartIncluding": "3.0"}, {"criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61861774-A71F-48CB-B6B2-0489C57E4E66", "versionEndIncluding": "4.7", "versionStartIncluding": "4.0"}, {"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01930746-6E15-445F-BD30-C4E83FA9AE25"}, {"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFBB466C-C679-4B4B-87C2-E7853E5B3F04"}, {"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A03692DD-779F-4E3C-861C-29943870A816"}, {"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79FF6B3C-A3CE-4AA2-80F9-44D05A6B2F08"}, {"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CF6E367-D33B-4B60-8C40-4618C47D53E8"}, {"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FA1F4FE-629C-4489-A13C-017A824C840F"}, {"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2479C5BF-94E1-4153-9FA3-333BC00F01D6"}, {"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8ABFCCCC-7584-466E-97CC-6EBD3934A70E"}, {"criteria": "cpe:2.3:a:squid-cache:squid:2.7:stable9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F17E49BF-FB11-4EE6-B6AC-30914F381B2F"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"}, {"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"}, {"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9"}, {"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "vulnerable": true, "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}