An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to use of a potentially dangerous function, Squid and the default certificate validation helper are vulnerable to a Denial of Service when opening a TLS connection to an attacker-controlled server for HTTPS. This occurs because unrecognized error values are mapped to NULL, but later code expects that each error value is mapped to a valid error string.
2020-06-30T19:15:11.130
2024-11-21T05:02:27.447
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | squid-cache | squid | ≤ 3.5.28 | Yes |
Application | squid-cache | squid | < 4.12 | Yes |
Application | squid-cache | squid | < 5.0.3 | Yes |
Operating System | fedoraproject | fedora | 31 | Yes |
Application | netapp | cloud_manager | - | Yes |