The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://usn.ubuntu.com/3557-1/ | third party advisory vendor advisory |
http://www.squid-cache.org/Versions/v4/changesets/SQUID-2018_2.patch | patch vendor advisory |
https://www.debian.org/security/2018/dsa-4122 | third party advisory vendor advisory |
http://www.squid-cache.org/Advisories/SQUID-2018_2.txt | patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html | third party advisory mailing list |
https://github.com/squid-cache/squid/pull/129/files | third party advisory |
http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_2.patch | patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00002.html | third party advisory mailing list |
https://usn.ubuntu.com/4059-2/ | vendor advisory |