The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later.
References
Link | Resource |
---|---|
https://github.com/squid-cache/squid/pull/129/files | Third Party Advisory |
http://www.squid-cache.org/Versions/v4/changesets/SQUID-2018_2.patch | Patch Vendor Advisory |
http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_2.patch | Patch Vendor Advisory |
http://www.squid-cache.org/Advisories/SQUID-2018_2.txt | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00002.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4122 | Third Party Advisory |
https://usn.ubuntu.com/3557-1/ | Third Party Advisory |
https://usn.ubuntu.com/4059-2/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-02-09 15:29
Updated : 2019-07-17 09:15
NVD link : CVE-2018-1000027
Mitre link : CVE-2018-1000027
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
squid-cache
- squid