DEBIAN-CVE-2020-8517

Source
https://security-tracker.debian.org/tracker/CVE-2020-8517
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2020-8517.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2020-8517
Upstream
Published
2020-02-04T20:15:14Z
Modified
2025-09-19T06:17:00Z
Summary
[none]
Details

An issue was discovered in Squid before 4.10. Due to incorrect input validation, the NTLM authentication credentials parser in extlmgroup_acl may write to memory outside the credentials buffer. On systems with memory access protections, this can result in the helper process being terminated unexpectedly. This leads to the Squid process also terminating and a denial of service for all clients using the proxy.

References

Affected packages

Debian:11 / squid

Package

Name
squid
Purl
pkg:deb/debian/squid?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / squid

Package

Name
squid
Purl
pkg:deb/debian/squid?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / squid

Package

Name
squid
Purl
pkg:deb/debian/squid?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:14 / squid

Package

Name
squid
Purl
pkg:deb/debian/squid?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10-1

Ecosystem specific

{
    "urgency": "unimportant"
}