CVE-2018-1000024

Name
CVE-2018-1000024
Description
The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Release Notes http://www.squid-cache.org/Versions/
Patch http://www.squid-cache.org/Advisories/SQUID-2018_1.txt
Mailing List https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html
Third Party Advisory https://www.debian.org/security/2018/dsa-4122
Third Party Advisory https://usn.ubuntu.com/3557-1/
UBUNTU https://usn.ubuntu.com/4059-2/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:* squid >= 3.0 <= 3.5.27
cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:* squid >= 4.0 <= 4.0.22

Vulnerable and fixed packages

Source package Branch Version Maintainer Status