CVE-2018-1172

NameCVE-2018-1172
DescriptionThis vulnerability allows remote attackers to deny service on vulnerable installations of The Squid Software Foundation Squid 3.5.27-20180318. Authentication is not required to exploit this vulnerability. The specific flaw exists within ClientRequestContext::sslBumpAccessCheck(). A crafted request can trigger the dereference of a null pointer. An attacker can leverage this vulnerability to create a denial-of-service condition to users of the system. Was ZDI-CAN-6088.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid (PTS)buster, buster (security)4.6-1+deb10u3fixed
bullseye, sid4.12-1fixed
squid3 (PTS)stretch3.5.23-5+deb9u1vulnerable
stretch (security)3.5.23-5+deb9u2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squidsourceexperimental4.0.21-1~exp5unimportant
squidsourcewheezy(not affected)
squidsource(unstable)4.1-1unimportant
squid3source(unstable)(unfixed)unimportant

Notes

[wheezy] - squid <not-affected> (Vunerable code introduced in 3.1)
src:squid as source package reintroduced for 4.x in experimental
http://www.squid-cache.org/Advisories/SQUID-2018_3.txt
Squid 3.5 patch: http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_3.patch
Only affects custom builds with OpenSSL support enabled

Search for package or bug name: Reporting problems