【安全公告:UTSA-2022-000379】-【CVE-2019-12521】

公告编号:作者:USRC发布日期:2022/09/09

【统信安全公告:UTSA-2022-000379】-【CVE-2019-12521】


一、漏洞描述

An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.

 

二、漏洞信息

漏洞编号:CVE-2019-12521

软件包名:squid

漏洞评级:中危

CVSS3.1评分:5.9

 

三、受影响UOS版本

服务器1050e、服务器1021e、服务器1020e

 

四、漏洞检测

检测方法如下:

                通过yum info Packagename查看包的版本信息

结果如下:

                版本<4.9-11.uel20受此漏洞影响,版本>=4.9-11.uel20此漏洞已修复

 

五、修复建议

                更新源后,使用yum install Packagename安装升级

 

六、修复状态

此漏洞补丁已于2022年8月24日推送至外网仓库源

 

七、修复验证

查看squid的版本>=4.9-11.uel20,说明此漏洞已修复

 

八、相关链接

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12521

https://nvd.nist.gov/vuln/detail/CVE-2019-12521