Debian LTS: DLA-2028-1: squid3 security update
Summary
URN response handling in Squid suffers from a heap-based buffer
overflow. When receiving data from a remote server in response to
an URN request, Squid fails to ensure that the response can fit
within the buffer. This leads to attacker controlled data
overflowing in the heap.
CVE-2019-18677
When the append_domain setting is used (because the appended
characters do not properly interact with hostname length
restrictions), it can inappropriately redirect traffic to origins
it should not be delivered to. This happens because of incorrect
message processing.
CVE-2019-18678
A programming error allows attackers to smuggle HTTP requests
through frontend software to a Squid instance that splits the HTTP
Request pipeline differently. The resulting Response messages
corrupt caches (between a client and Squid) with
attacker-controlled content at arbitrary URLs. Effects are isolated
to software between the attacker client and Squid.
...