{ "schema_version": "1.4.0", "id": "GHSA-hwhj-rr4w-2xmm", "modified": "2022-05-14T00:56:21Z", "published": "2022-05-14T00:56:21Z", "aliases": [ "CVE-2018-1000027" ], "details": "The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000027" }, { "type": "WEB", "url": "https://github.com/squid-cache/squid/pull/129/files" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00002.html" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3557-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4059-2" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4122" }, { "type": "WEB", "url": "http://www.squid-cache.org/Advisories/SQUID-2018_2.txt" }, { "type": "WEB", "url": "http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_2.patch" }, { "type": "WEB", "url": "http://www.squid-cache.org/Versions/v4/changesets/SQUID-2018_2.patch" } ], "database_specific": { "cwe_ids": [ "CWE-476" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-02-09T23:29:00Z" } }