CVE-2018-1172

Source
https://cve.org/CVERecord?id=CVE-2018-1172
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1172.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-1172
Downstream
Related
Published
2018-05-16T21:29:00.280Z
Modified
2026-04-02T00:39:01.762030Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

This vulnerability allows remote attackers to deny service on vulnerable installations of The Squid Software Foundation Squid 3.5.27-20180318. Authentication is not required to exploit this vulnerability. The specific flaw exists within ClientRequestContext::sslBumpAccessCheck(). A crafted request can trigger the dereference of a null pointer. An attacker can leverage this vulnerability to create a denial-of-service condition to users of the system. Was ZDI-CAN-6088.

References

Affected packages

Git / github.com/squid-cache/squid

Affected ranges

Type
GIT
Repo
https://github.com/squid-cache/squid
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "3.5.27"
        }
    ]
}

Affected versions

Other
BASIC_TPROXY4
HISTORIC_RELEASES
M-staged-PR151
M-staged-PR161
M-staged-PR170
M-staged-PR175
M-staged-PR176
M-staged-PR177
M-staged-PR179
M-staged-PR181
M-staged-PR182
M-staged-PR183
M-staged-PR186
M-staged-PR187
M-staged-PR189
M-staged-PR193
M-staged-PR195
M-staged-PR196
M-staged-PR198
M-staged-PR199
M-staged-PR200
M-staged-PR202
M-staged-PR206
M-staged-PR208
M-staged-PR209
M-staged-PR210
M-staged-PR211
M-staged-PR213
M-staged-PR218
M-staged-PR220
M-staged-PR221
M-staged-PR223
M-staged-PR225
M-staged-PR227
M-staged-PR228
M-staged-PR229
M-staged-PR230
M-staged-PR231
M-staged-PR232
M-staged-PR235
M-staged-PR237
M-staged-PR238
M-staged-PR239
M-staged-PR241
M-staged-PR242
M-staged-PR243
M-staged-PR252
M-staged-PR255
M-staged-PR258
M-staged-PR264
M-staged-PR266
M-staged-PR267
M-staged-PR268
M-staged-PR362
M-staged-PR71
SQUID_3_0_PRE1
SQUID_3_0_PRE2
SQUID_3_0_PRE3
SQUID_3_0_PRE4
SQUID_3_0_PRE5
SQUID_3_0_PRE6
SQUID_3_0_PRE7
SQUID_3_0_RC1
SQUID_3_0_STABLE1
SQUID_3_0_STABLE10
SQUID_3_0_STABLE11
SQUID_3_0_STABLE11_RC1
SQUID_3_0_STABLE12
SQUID_3_0_STABLE13
SQUID_3_0_STABLE14
SQUID_3_0_STABLE15
SQUID_3_0_STABLE16
SQUID_3_0_STABLE16_RC1
SQUID_3_0_STABLE17
SQUID_3_0_STABLE18
SQUID_3_0_STABLE19
SQUID_3_0_STABLE2
SQUID_3_0_STABLE20
SQUID_3_0_STABLE21
SQUID_3_0_STABLE22
SQUID_3_0_STABLE23
SQUID_3_0_STABLE24
SQUID_3_0_STABLE25
SQUID_3_0_STABLE26
SQUID_3_0_STABLE3
SQUID_3_0_STABLE4
SQUID_3_0_STABLE5
SQUID_3_0_STABLE6
SQUID_3_0_STABLE7
SQUID_3_0_STABLE8
SQUID_3_0_STABLE9
SQUID_3_1_0_1
SQUID_3_1_0_10
SQUID_3_1_0_11
SQUID_3_1_0_12
SQUID_3_1_0_13
SQUID_3_1_0_14
SQUID_3_1_0_15
SQUID_3_1_0_16
SQUID_3_1_0_17
SQUID_3_1_0_18
SQUID_3_1_0_2
SQUID_3_1_0_3
SQUID_3_1_0_4
SQUID_3_1_0_5
SQUID_3_1_0_6
SQUID_3_1_0_7
SQUID_3_1_0_8
SQUID_3_1_0_9
SQUID_3_1_1
SQUID_3_1_10
SQUID_3_1_11
SQUID_3_1_12
SQUID_3_1_12_1
SQUID_3_1_12_2
SQUID_3_1_12_3
SQUID_3_1_13
SQUID_3_1_14
SQUID_3_1_15
SQUID_3_1_16
SQUID_3_1_17
SQUID_3_1_18
SQUID_3_1_19
SQUID_3_1_2
SQUID_3_1_20
SQUID_3_1_21
SQUID_3_1_22
SQUID_3_1_23
SQUID_3_1_3
SQUID_3_1_4
SQUID_3_1_5
SQUID_3_1_5_1
SQUID_3_1_6
SQUID_3_1_7
SQUID_3_1_8
SQUID_3_1_9
SQUID_3_2_0_1
SQUID_3_2_0_10
SQUID_3_2_0_11
SQUID_3_2_0_12
SQUID_3_2_0_13
SQUID_3_2_0_14
SQUID_3_2_0_15
SQUID_3_2_0_16
SQUID_3_2_0_17
SQUID_3_2_0_18
SQUID_3_2_0_19
SQUID_3_2_0_2
SQUID_3_2_0_3
SQUID_3_2_0_4
SQUID_3_2_0_5
SQUID_3_2_0_6
SQUID_3_2_0_7
SQUID_3_2_0_8
SQUID_3_2_0_9
SQUID_3_2_1
SQUID_3_2_10
SQUID_3_2_11
SQUID_3_2_12
SQUID_3_2_13
SQUID_3_2_14
SQUID_3_2_2
SQUID_3_2_3
SQUID_3_2_4
SQUID_3_2_5
SQUID_3_2_6
SQUID_3_2_7
SQUID_3_2_8
SQUID_3_2_9
SQUID_3_3_0_1
SQUID_3_3_0_2
SQUID_3_3_0_3
SQUID_3_3_1
SQUID_3_3_10
SQUID_3_3_11
SQUID_3_3_12
SQUID_3_3_13
SQUID_3_3_14
SQUID_3_3_2
SQUID_3_3_3
SQUID_3_3_4
SQUID_3_3_5
SQUID_3_3_6
SQUID_3_3_7
SQUID_3_3_8
SQUID_3_3_9
SQUID_3_4_0_1
SQUID_3_4_0_2
SQUID_3_4_0_3
SQUID_3_4_1
SQUID_3_4_10
SQUID_3_4_11
SQUID_3_4_12
SQUID_3_4_13
SQUID_3_4_14
SQUID_3_4_2
SQUID_3_4_3
SQUID_3_4_4
SQUID_3_4_4_1
SQUID_3_4_4_2
SQUID_3_4_5
SQUID_3_4_6
SQUID_3_4_7
SQUID_3_4_8
SQUID_3_4_9
SQUID_3_5_0_1
SQUID_3_5_0_2
SQUID_3_5_0_3
SQUID_3_5_0_4
SQUID_3_5_1
SQUID_3_5_10
SQUID_3_5_11
SQUID_3_5_12
SQUID_3_5_13
SQUID_3_5_14
SQUID_3_5_15
SQUID_3_5_16
SQUID_3_5_17
SQUID_3_5_18
SQUID_3_5_19
SQUID_3_5_2
SQUID_3_5_20
SQUID_3_5_21
SQUID_3_5_22
SQUID_3_5_23
SQUID_3_5_24
SQUID_3_5_25
SQUID_3_5_26
SQUID_3_5_27
SQUID_3_5_28
SQUID_3_5_3
SQUID_3_5_4
SQUID_3_5_5
SQUID_3_5_6
SQUID_3_5_7
SQUID_3_5_8
SQUID_3_5_9
SQUID_4_0_1
SQUID_4_0_10
SQUID_4_0_11
SQUID_4_0_12
SQUID_4_0_13
SQUID_4_0_14
SQUID_4_0_15
SQUID_4_0_16
SQUID_4_0_17
SQUID_4_0_18
SQUID_4_0_19
SQUID_4_0_2
SQUID_4_0_20
SQUID_4_0_21
SQUID_4_0_22
SQUID_4_0_23
SQUID_4_0_24
SQUID_4_0_25
SQUID_4_0_3
SQUID_4_0_4
SQUID_4_0_5
SQUID_4_0_6
SQUID_4_0_7
SQUID_4_0_8
SQUID_4_0_9
SQUID_4_1
SQUID_4_10
SQUID_4_11
SQUID_4_12
SQUID_4_13
SQUID_4_14
SQUID_4_15
SQUID_4_16
SQUID_4_17
SQUID_4_2
SQUID_4_3
SQUID_4_4
SQUID_4_5
SQUID_4_6
SQUID_4_7
SQUID_4_8
SQUID_4_9
for-libecap-v0p1
merge-candidate-3-v1
merge-candidate-3-v2
sourceformat-review-1
take00
take01
take02
take03
take04
take06
take07
take08
take09
take1
take2
BumpSslServerFirst.*
BumpSslServerFirst.take01
BumpSslServerFirst.take02
BumpSslServerFirst.take03
BumpSslServerFirst.take04
BumpSslServerFirst.take05
BumpSslServerFirst.take06
BumpSslServerFirst.take07
BumpSslServerFirst.take08
BumpSslServerFirst.take09
BumpSslServerFirst.take10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1172.json"