First published: Tue Feb 04 2020(Updated: )
An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | <4.10 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
openSUSE Leap | =15.1 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
IBM Security Guardium | <=10.5 | |
IBM Security Guardium | <=10.6 | |
IBM Security Guardium | <=11.0 | |
IBM Security Guardium | <=11.1 | |
IBM Security Guardium | <=11.2 | |
IBM Security Guardium | <=11.3 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8450 is a vulnerability in Squid before version 4.10 that allows a remote attacker to execute arbitrary code or cause a denial of service.
Squid versions before 4.10 are affected by CVE-2020-8450.
CVE-2020-8450 has a severity rating of 9.8, which is considered critical.
To fix CVE-2020-8450, you should update Squid to version 4.10 or later.
You can find more information about CVE-2020-8450 in the following references: [Link 1](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html), [Link 2](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html), [Link 3](http://www.squid-cache.org/Advisories/SQUID-2020_1.txt).