Lucene search

K
archlinuxArch LinuxASA-201505-1
HistoryMay 01, 2015 - 12:00 a.m.

squid: weak certificate validation

2015-05-0100:00:00
Arch Linux
lists.archlinux.org
20

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.016 Low

EPSS

Percentile

85.8%

The flaw allows remote servers to bypass client certificate validation.
Some attackers may also be able to use valid certificates for one domain
signed by a global Certificate Authority to abuse an unrelated domain.
However, the bug is exploitable only if you have configured Squid to
perform SSL Bumping with the "client-first" or "bump" mode of operation.
Sites that do not use SSL-Bump are not vulnerable.

OSVersionArchitecturePackageVersionFilename
anyanyanysquid< 3.5.4-1UNKNOWN

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.016 Low

EPSS

Percentile

85.8%