An issue was discovered in Squid 5.0.6 through 5.1.x before 5.2. When validating an origin server or peer certificate, Squid may incorrectly classify certain certificates as trusted. This problem allows a remote server to obtain security trust well improperly. This indication of trust may be passed along to clients, allowing access to unsafe or hijacked services.
References
Configurations
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/12/23/2 - Mailing List, Third Party Advisory | |
References | () http://www.squid-cache.org/Versions/v6/changesets/squid-6-43d6b5c81b88ec2256b430c69a872a1e4f324e4a.patch - Vendor Advisory | |
References | () https://github.com/squid-cache/squid/security/advisories/GHSA-47m4-g3mv-9q5r - Patch, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CWQ2WKDWTSO47S3F6XJJ6HGG2ULWEAE4/ - |
07 Nov 2023, 03:38
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-10-18 09:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41611
Mitre link : CVE-2021-41611
CVE.ORG link : CVE-2021-41611
JSON object : View
Products Affected
squid-cache
- squid
fedoraproject
- fedora
CWE
CWE-295
Improper Certificate Validation