Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-14058
HistoryJun 30, 2020 - 12:00 a.m.

CVE-2020-14058

2020-06-3000:00:00
ubuntu.com
ubuntu.com
9

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.006 Low

EPSS

Percentile

77.7%

An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to
use of a potentially dangerous function, Squid and the default certificate
validation helper are vulnerable to a Denial of Service when opening a TLS
connection to an attacker-controlled server for HTTPS. This occurs because
unrecognized error values are mapped to NULL, but later code expects that
each error value is mapped to a valid error string.

Notes

Author Note
mdeslaur In Ubuntu, squid is built without openssl support, so this is not an issue.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.006 Low

EPSS

Percentile

77.7%