CVE-2020-14058
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/06/2020
Last modified:
07/11/2023
Description
An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to use of a potentially dangerous function, Squid and the default certificate validation helper are vulnerable to a Denial of Service when opening a TLS connection to an attacker-controlled server for HTTPS. This occurs because unrecognized error values are mapped to NULL, but later code expects that each error value is mapped to a valid error string.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:* | 3.1 (including) | 3.5.28 (including) |
| cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:* | 4.0 (including) | 4.12 (excluding) |
| cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:* | 5.0 (including) | 5.0.3 (excluding) |
| cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.squid-cache.org/Advisories/SQUID-2020_6.txt
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-93f5fda134a2a010b84ffedbe833d670e63ba4be.patch
- http://www.squid-cache.org/Versions/v5/changesets/squid-5-c6d1a4f6a2cbebceebc8a3fcd8f539ceb7b7f723.patch
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/
- https://security.netapp.com/advisory/ntap-20210312-0001/



