The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.
References
Link | Resource |
---|---|
http://www.squid-cache.org/Advisories/SQUID-2018_1.txt | Patch Vendor Advisory |
http://www.squid-cache.org/Versions/ | Release Notes Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3557-1/ | Third Party Advisory |
https://usn.ubuntu.com/4059-2/ | |
https://www.debian.org/security/2018/dsa-4122 | Third Party Advisory |
http://www.squid-cache.org/Advisories/SQUID-2018_1.txt | Patch Vendor Advisory |
http://www.squid-cache.org/Versions/ | Release Notes Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3557-1/ | Third Party Advisory |
https://usn.ubuntu.com/4059-2/ | |
https://www.debian.org/security/2018/dsa-4122 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.squid-cache.org/Advisories/SQUID-2018_1.txt - Patch, Vendor Advisory | |
References | () http://www.squid-cache.org/Versions/ - Release Notes, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html - Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/3557-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4059-2/ - | |
References | () https://www.debian.org/security/2018/dsa-4122 - Third Party Advisory |
Information
Published : 2018-02-09 23:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000024
Mitre link : CVE-2018-1000024
CVE.ORG link : CVE-2018-1000024
JSON object : View
Products Affected
squid-cache
- squid
debian
- debian_linux
canonical
- ubuntu_linux
CWE