First published: Wed May 16 2018(Updated: )
This vulnerability allows remote attackers to deny service on vulnerable installations of The Squid Software Foundation Squid 3.5.27-20180318. Authentication is not required to exploit this vulnerability. The specific flaw exists within ClientRequestContext::sslBumpAccessCheck(). A crafted request can trigger the dereference of a null pointer. An attacker can leverage this vulnerability to create a denial-of-service condition to users of the system. Was ZDI-CAN-6088.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | =3.5.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-1172 is medium with a CVSS score of 5.9.
The Squid Software Foundation Squid version 3.5.27 is affected by CVE-2018-1172.
CVE-2018-1172 is a vulnerability that allows remote attackers to deny service on vulnerable installations of The Squid Software Foundation Squid 3.5.27-20180318.
No, authentication is not required to exploit CVE-2018-1172.
To fix CVE-2018-1172, it is recommended to update to a patched version of The Squid Software Foundation Squid.