cvelist/2018/1000xxx/CVE-2018-1000027.json

1 line
1.4 KiB
JSON
Raw Normal View History

2018-02-08 12:40:53 -07:00
{"data_version": "4.0","references": {"reference_data": [{"url": "https://github.com/squid-cache/squid/pull/129/files"},{"url": "http://www.squid-cache.org/Advisories/SQUID-2018_2.txt"},{"url": "http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_2.patch"},{"url": "http://www.squid-cache.org/Versions/v4/changesets/SQUID-2018_2.patch"}]},"description": {"description_data": [{"lang": "eng","value": "The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "prior to version 4.0.23"}]},"product_name": "Squid HTTP Caching Proxy"}]},"vendor_name": "The Squid Software Foundation"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "1/18/2018 15:05:14","ID": "CVE-2018-1000027","ASSIGNER": "kurt@seifried.org","REQUESTER": "squid3@treenet.co.nz"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "NULL Pointer Dereference"}]}]}}