First published: Tue Feb 04 2020(Updated: )
An issue was discovered in Squid before 4.10. Due to incorrect input validation, the NTLM authentication credentials parser in ext_lm_group_acl may write to memory outside the credentials buffer. On systems with memory access protections, this can result in the helper process being terminated unexpectedly. This leads to the Squid process also terminating and a denial of service for all clients using the proxy.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.10-1 | |
Squid Web Proxy Cache | <4.10 | |
openSUSE | =15.1 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID for this vulnerability is CVE-2020-8517.
The severity of CVE-2020-8517 is high with a score of 7.5.
Versions of Squid before 4.10 are affected by CVE-2020-8517.
To fix CVE-2020-8517, update Squid to version 4.10 or later.
You can find more information about CVE-2020-8517 at the following references: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html), [Reference 2](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html), [Reference 3](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html).