Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2018-1000027: Moderate: squid security and bug fix update (CESA-2020:1068)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

CentOS Linux: CVE-2018-1000027: Moderate: squid security and bug fix update (CESA-2020:1068)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
02/09/2018
Created
04/02/2020
Added
04/01/2020
Modified
05/25/2023

Description

The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later.

Solution(s)

  • centos-upgrade-squid
  • centos-upgrade-squid-debuginfo
  • centos-upgrade-squid-migration-script
  • centos-upgrade-squid-sysvinit

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;