First published: Tue Jun 30 2020(Updated: )
An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to use of a potentially dangerous function, Squid and the default certificate validation helper are vulnerable to a Denial of Service when opening a TLS connection to an attacker-controlled server for HTTPS. This occurs because unrecognized error values are mapped to NULL, but later code expects that each error value is mapped to a valid error string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | >=3.1<=3.5.28 | |
Squid-Cache Squid | >=4.0<4.12 | |
Squid-Cache Squid | >=5.0<5.0.3 | |
Fedoraproject Fedora | =31 | |
NetApp Cloud Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-14058.
The severity of CVE-2020-14058 is high with a severity value of 7.5.
CVE-2020-14058 affects Squid versions before 4.12 and 5.x before 5.0.3.
This vulnerability can be exploited by opening a TLS connection to an attacker-controlled server for HTTPS, which leads to a Denial of Service.
More information about CVE-2020-14058 can be found at the following references: [link1], [link2], [link3].