Buffer Overflow in smblib.c
Medium
I
Internet Bug Bounty
Submitted None
Actions:
Reported by
aaron_costello
Vulnerability Details
Technical details and impact analysis
## Summary:
In Squid 4.8, a local buffer overflow vulnerability exists in the
Smb_Connect() and Smb_Connect_Server() functions of Squid's smblib.c, in which an attacker can achieve code execution that can result in the disclosure of credential hashes. The cause of this overflow is due to the SMB domain controller names being passed down from user input and eventually into an array without performing appropriate bounds checking on said array.
I submitted a patch, which was accepted and merged, which can be found here:
https://github.com/squid-cache/squid/pull/494
## Disclosure Timeline
15/10/19 - Initial discovery and disclosure to the Squid team via squid-bugs private email list
16/10/19 - Acknowledgement of the vulnerability by the Squid team
17/10/19 - I volunteered to fix the issue, and create a pull request on Github (See above link)
17-19/10/19 - The fix was reviewed, accepted, then merged (Fix is also backported to older Squid Versions)
23/10/19 - CVE-2019-18353 assigned
## To Note
Due to the fact that this is a local (as opposed to remote) overflow, and used primarily by squid auth helpers for downgrading (As pointed out by a member of the squid team when he said an advisory would not be released because of the 'nature' of what the squid helpers are doing); I am setting the severity as medium and not expectant for a bounty.
## Impact
Code execution resulting in the retrieval of credential hashes
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Classic Buffer Overflow