Description
An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.
Published: 2020-04-15
Score: 4.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-4117 An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00666}

epss

{'score': 0.00483}


Subscriptions

Squid-cache Squid
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:24:38.888Z

Reserved: 2019-06-02T00:00:00.000Z

Link: CVE-2019-12522

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-15T19:15:12.473

Modified: 2024-11-21T04:23:01.737

Link: CVE-2019-12522

cve-icon Redhat

Severity : Low

Publid Date: 2020-04-24T00:00:00Z

Links: CVE-2019-12522 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses