CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
87.3%
Debian Security Advisory DSA-4122-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
February 23, 2018 https://www.debian.org/security/faq
Package : squid3
CVE ID : CVE-2018-1000024 CVE-2018-1000027
Debian Bug : 888719 888720
Several vulnerabilities have been discovered in Squid3, a fully featured
web proxy cache. The Common Vulnerabilities and Exposures project
identifies the following issues:
CVE-2018-1000024
Louis Dion-Marcil discovered that Squid does not properly handle
processing of certain ESI responses. A remote server delivering
certain ESI response syntax can take advantage of this flaw to cause
a denial of service for all clients accessing the Squid service.
This problem is limited to the Squid custom ESI parser.
http://www.squid-cache.org/Advisories/SQUID-2018_1.txt
CVE-2018-1000027
Louis Dion-Marcil discovered that Squid is prone to a denial of
service vulnerability when processing ESI responses or downloading
intermediate CA certificates. A remote attacker can take advantage
of this flaw to cause a denial of service for all clients accessing
the Squid service.
http://www.squid-cache.org/Advisories/SQUID-2018_2.txt
For the oldstable distribution (jessie), these problems have been fixed
in version 3.4.8-6+deb8u5.
For the stable distribution (stretch), these problems have been fixed in
version 3.5.23-5+deb9u1.
We recommend that you upgrade your squid3 packages.
For the detailed security status of squid3 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/squid3
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | all | squid | < 2.7.STABLE9-4.1+deb7u3 | squid_2.7.STABLE9-4.1+deb7u3_all.deb |
Debian | 8 | arm64 | squid-cgi | < 3.4.8-6+deb8u5 | squid-cgi_3.4.8-6+deb8u5_arm64.deb |
Debian | 7 | armhf | squid | < 2.7.STABLE9-4.1+deb7u3 | squid_2.7.STABLE9-4.1+deb7u3_armhf.deb |
Debian | 9 | armhf | squid-purge | < 3.5.23-5+deb9u1 | squid-purge_3.5.23-5+deb9u1_armhf.deb |
Debian | 8 | mips | squid3 | < 3.4.8-6+deb8u5 | squid3_3.4.8-6+deb8u5_mips.deb |
Debian | 9 | mips | squid | < 3.5.23-5+deb9u1 | squid_3.5.23-5+deb9u1_mips.deb |
Debian | 9 | mips64el | squid-dbg | < 3.5.23-5+deb9u1 | squid-dbg_3.5.23-5+deb9u1_mips64el.deb |
Debian | 9 | armel | squid-dbg | < 3.5.23-5+deb9u1 | squid-dbg_3.5.23-5+deb9u1_armel.deb |
Debian | 7 | i386 | squid3 | < 3.1.20-2.2+deb7u8 | squid3_3.1.20-2.2+deb7u8_i386.deb |
Debian | 7 | i386 | squid3-dbg | < 3.1.20-2.2+deb7u8 | squid3-dbg_3.1.20-2.2+deb7u8_i386.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
87.3%