CVE-2018-1172
Publication date 16 May 2018
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
This vulnerability allows remote attackers to deny service on vulnerable installations of The Squid Software Foundation Squid 3.5.27-20180318. Authentication is not required to exploit this vulnerability. The specific flaw exists within ClientRequestContext::sslBumpAccessCheck(). A crafted request can trigger the dereference of a null pointer. An attacker can leverage this vulnerability to create a denial-of-service condition to users of the system. Was ZDI-CAN-6088.
Status
| Package | Ubuntu Release | Status | 
|---|---|---|
| squid3 | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Not affected 
                                
                               | |
| 14.04 LTS trusty | Not in release | 
Notes
mdeslaur
squid3 in Ubuntu is not built with OpenSSL support, so Ubuntu isn't actually vulnerable to this issue.
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score |  | 
| Attack vector | Network | 
| Attack complexity | High | 
| Privileges required | None | 
| User interaction | None | 
| Scope | Unchanged | 
| Confidentiality | None | 
| Integrity impact | None | 
| Availability impact | High | 
| Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |