CVE-2019-18679

7.5 HIGH

📋 TL;DR

This Squid vulnerability exposes heap memory pointer values in nonce tokens during HTTP Digest Authentication, weakening ASLR protections. Attackers can use this information disclosure to map memory layouts and potentially facilitate remote code execution attacks. All Squid 2.x, 3.x, and 4.x through 4.8 installations using HTTP Digest Authentication are affected.

💻 Affected Systems

Products:
  • Squid
Versions: 2.x, 3.x, and 4.x through 4.8
Operating Systems: All operating systems running affected Squid versions
Default Config Vulnerable: ✅ No
Notes: Only affects configurations using HTTP Digest Authentication. Basic authentication and other auth methods are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers combine this information disclosure with other vulnerabilities to achieve remote code execution, potentially compromising the entire Squid proxy server.

🟠

Likely Case

Attackers gather memory layout information to improve reliability of other exploitation attempts against the Squid instance.

🟢

If Mitigated

Information disclosure occurs but attackers cannot chain it with other vulnerabilities due to proper security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires HTTP Digest Authentication to be enabled and typically requires chaining with other vulnerabilities for full impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Squid 4.9 and later, or apply specific patches to earlier versions

Vendor Advisory: http://www.squid-cache.org/Advisories/SQUID-2019_11.txt

Restart Required: Yes

Instructions:

1. Upgrade to Squid 4.9 or later. 2. For earlier versions, apply the patch from squid-cache.org. 3. Restart Squid service.

🔧 Temporary Workarounds

Disable HTTP Digest Authentication

linux

Disable HTTP Digest Authentication if not required for your deployment

Edit squid.conf and remove or comment out 'auth_param digest' lines
Restart Squid: systemctl restart squid

🧯 If You Can't Patch

  • Disable HTTP Digest Authentication entirely
  • Implement network segmentation to restrict access to Squid proxy

🔍 How to Verify

Check if Vulnerable:

Check Squid version and configuration for HTTP Digest Authentication usage

Check Version:

squid -v | grep Version

Verify Fix Applied:

Verify Squid version is 4.9+ or check that patch has been applied

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts using Digest method
  • Multiple failed authentication attempts

Network Indicators:

  • HTTP requests with Digest authentication headers to Squid proxy

SIEM Query:

source="squid" AND "digest" AND ("auth" OR "authentication")

🔗 References

📤 Share & Export