{"data_version":"4.0","references":{"reference_data":[{"url":"https://github.com/squid-cache/squid/pull/129/files"},{"url":"http://www.squid-cache.org/Advisories/SQUID-2018_2.txt"},{"url":"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_2.patch"},{"url":"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2018_2.patch"}]},"description":{"description_data":[{"lang":"eng","value":"The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later."}]},"data_type":"CVE","affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"version":{"version_data":[{"version_value":"prior to version 4.0.23"}]},"product_name":"Squid HTTP Caching Proxy"}]},"vendor_name":"The Squid Software Foundation"}]}},"CVE_data_meta":{"DATE_ASSIGNED":"1/18/2018 15:05:14","ID":"CVE-2018-1000027","ASSIGNER":"kurt@seifried.org","REQUESTER":"squid3@treenet.co.nz"},"data_format":"MITRE","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"NULL Pointer Dereference"}]}]}}