CVE-2018-1000024

The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

History

21 Nov 2024, 03:39

Type Values Removed Values Added
References () http://www.squid-cache.org/Advisories/SQUID-2018_1.txt - Patch, Vendor Advisory () http://www.squid-cache.org/Advisories/SQUID-2018_1.txt - Patch, Vendor Advisory
References () http://www.squid-cache.org/Versions/ - Release Notes, Vendor Advisory () http://www.squid-cache.org/Versions/ - Release Notes, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html - Mailing List, Third Party Advisory
References () https://usn.ubuntu.com/3557-1/ - Third Party Advisory () https://usn.ubuntu.com/3557-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4059-2/ - () https://usn.ubuntu.com/4059-2/ -
References () https://www.debian.org/security/2018/dsa-4122 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4122 - Third Party Advisory

Information

Published : 2018-02-09 23:29

Updated : 2024-11-21 03:39


NVD link : CVE-2018-1000024

Mitre link : CVE-2018-1000024

CVE.ORG link : CVE-2018-1000024


JSON object : View

Products Affected

squid-cache

  • squid

debian

  • debian_linux

canonical

  • ubuntu_linux