An issue was discovered in Squid 5.0.6 through 5.1.x before 5.2. When validating an origin server or peer certificate, Squid may incorrectly classify certain certificates as trusted. This problem allows a remote server to obtain security trust well improperly. This indication of trust may be passed along to clients, allowing access to unsafe or hijacked services.
References
Link | Resource |
---|---|
http://www.squid-cache.org/Versions/v6/changesets/squid-6-43d6b5c81b88ec2256b430c69a872a1e4f324e4a.patch | Vendor Advisory |
https://github.com/squid-cache/squid/security/advisories/GHSA-47m4-g3mv-9q5r | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWQ2WKDWTSO47S3F6XJJ6HGG2ULWEAE4/ | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/12/23/2 | Mailing List Third Party Advisory |
Information
Published : 2021-10-18 02:15
Updated : 2022-03-31 09:26
NVD link : CVE-2021-41611
Mitre link : CVE-2021-41611
JSON object : View
CWE
CWE-295
Improper Certificate Validation
Products Affected
fedoraproject
- fedora
squid-cache
- squid