CVE-2018-1172

NameCVE-2018-1172
DescriptionThis vulnerability allows remote attackers to deny service on vulnerable installations of The Squid Software Foundation Squid 3.5.27-20180318. Authentication is not required to exploit this vulnerability. The specific flaw exists within ClientRequestContext::sslBumpAccessCheck(). A crafted request can trigger the dereference of a null pointer. An attacker can leverage this vulnerability to create a denial-of-service condition to users of the system. Was ZDI-CAN-6088.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid (PTS)bullseye (security), bullseye4.13-10+deb11u3fixed
bookworm, bookworm (security)5.7-2+deb12u2fixed
sid, trixie6.12-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squidsourceexperimental4.0.21-1~exp5unimportant
squidsourcewheezy(not affected)
squidsource(unstable)4.1-1unimportant
squid3source(unstable)(unfixed)unimportant

Notes

[wheezy] - squid <not-affected> (Vunerable code introduced in 3.1)
src:squid as source package reintroduced for 4.x in experimental
http://www.squid-cache.org/Advisories/SQUID-2018_3.txt
Squid 3.5 patch: http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_3.patch
Only affects custom builds with OpenSSL support enabled

Search for package or bug name: Reporting problems