Buffer Overflow Affecting squid package, versions [2.5,5.7)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-SQUID-3033163
  • published26 Sept 2022
  • disclosed23 Sept 2022
  • creditUnknown

Introduced: 23 Sep 2022

CVE-2022-41318  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade squid to version 5.7 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow when Squid is configured to use NTLM or Negotiate authentication with one of the vulnerable helpers, due to an incorrect integer overflow protection.

** Note: **

This attack is limited to authentication helpers Squid SSPI and SMB authentication built using the libntlmauth library shipped by Squid.

Workaround:

Users who are unable to upgrade to the fixed version should:

  1. Disable use of the vulnerable authentication scheme OR
  2. Replace the vulnerable helper with an alternative helper for the same authentication scheme OR
  3. Replace the vulnerable helper binary with one built from an updated or patched Squid release. The remainder of Squid does not need updating to fix this.

CVSS Scores

version 3.1