Loading HuntDB...

Buffer Overflow in smblib.c

Medium
I
Internet Bug Bounty
Submitted None
Reported by aaron_costello

Vulnerability Details

Technical details and impact analysis

Classic Buffer Overflow
## Summary: In Squid 4.8, a local buffer overflow vulnerability exists in the Smb_Connect() and Smb_Connect_Server() functions of Squid's smblib.c, in which an attacker can achieve code execution that can result in the disclosure of credential hashes. The cause of this overflow is due to the SMB domain controller names being passed down from user input and eventually into an array without performing appropriate bounds checking on said array. I submitted a patch, which was accepted and merged, which can be found here: https://github.com/squid-cache/squid/pull/494 ## Disclosure Timeline 15/10/19 - Initial discovery and disclosure to the Squid team via squid-bugs private email list 16/10/19 - Acknowledgement of the vulnerability by the Squid team 17/10/19 - I volunteered to fix the issue, and create a pull request on Github (See above link) 17-19/10/19 - The fix was reviewed, accepted, then merged (Fix is also backported to older Squid Versions) 23/10/19 - CVE-2019-18353 assigned ## To Note Due to the fact that this is a local (as opposed to remote) overflow, and used primarily by squid auth helpers for downgrading (As pointed out by a member of the squid team when he said an advisory would not be released because of the 'nature' of what the squid helpers are doing); I am setting the severity as medium and not expectant for a bounty. ## Impact Code execution resulting in the retrieval of credential hashes

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Classic Buffer Overflow