First published: Tue Feb 04 2020(Updated: )
An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.10-1 | |
IBM InfoSphere Guardium z/OS | <=10.5 | |
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.0 | |
IBM InfoSphere Guardium z/OS | <=11.1 | |
IBM InfoSphere Guardium z/OS | <=11.2 | |
IBM InfoSphere Guardium z/OS | <=11.3 | |
Squid Web Proxy Cache | <4.10 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 | |
SUSE Linux | =15.1 | |
Fedora | =30 | |
Fedora | =31 | |
Debian | =9.0 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8450 is a vulnerability in Squid before version 4.10 that allows a remote attacker to execute arbitrary code or cause a denial of service.
Squid versions before 4.10 are affected by CVE-2020-8450.
CVE-2020-8450 has a severity rating of 9.8, which is considered critical.
To fix CVE-2020-8450, you should update Squid to version 4.10 or later.
You can find more information about CVE-2020-8450 in the following references: [Link 1](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html), [Link 2](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html), [Link 3](http://www.squid-cache.org/Advisories/SQUID-2020_1.txt).