![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2018-1000024 |
Description: | The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.107294 1.3.6.1.4.1.25623.1.0.704122 1.3.6.1.4.1.25623.1.0.891266 1.3.6.1.4.1.25623.1.0.107293 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-1000024 Debian Security Information: DSA-4122 (Google Search) https://www.debian.org/security/2018/dsa-4122 http://www.squid-cache.org/Versions/ https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html https://usn.ubuntu.com/3557-1/ https://usn.ubuntu.com/4059-2/ |