CVE-2020-14058
moderate-risk
Published 2020-06-30
An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to use of a potentially dangerous function, Squid and the default certificate validation helper are vulnerable to a Denial of Service when opening a TLS connection to an attacker-controlled server for HTTPS. This occurs because unrecognized error values are mapped to NULL, but later code expects that each error value is mapped to a valid error string.
Do I need to act?
-
0.55% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (3)
Affected Vendors
References (10)
Vendor Advisory
http://www.squid-cache.org/Advisories/SQUID-2020_6.txt
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210312-0001/
Vendor Advisory
http://www.squid-cache.org/Advisories/SQUID-2020_6.txt
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210312-0001/
37
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
2/34 · Minimal
Exposure
9/34 · Low