First published: Tue Feb 04 2020(Updated: )
An issue was discovered in Squid before 4.10. Due to incorrect input validation, it can interpret crafted HTTP requests in unexpected ways to access server resources prohibited by earlier security filters.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | <4.10 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
openSUSE Leap | =15.1 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
IBM Security Guardium | <=10.5 | |
IBM Security Guardium | <=10.6 | |
IBM Security Guardium | <=11.0 | |
IBM Security Guardium | <=11.1 | |
IBM Security Guardium | <=11.2 | |
IBM Security Guardium | <=11.3 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8449 is a vulnerability in Squid that allows a remote attacker to obtain sensitive information.
CVE-2020-8449 has a severity rating of 7.5 (High).
CVE-2020-8449 exploits improper input validation in Squid by sending a specially-crafted HTTP request to obtain server resources information.
Squid versions before 4.10 are affected by CVE-2020-8449.
To fix CVE-2020-8449, update Squid to version 4.10 or later.