{"id":"USN-4477-1","summary":"squid vulnerabilities","details":"Amit Klein discovered that Squid incorrectly validated certain data. A\nremote attacker could possibly use this issue to perform an HTTP request\nsmuggling attack, resulting in cache poisoning. (CVE-2020-15810)\n\nRégis Leroy discovered that Squid incorrectly validated certain data. A\nremote attacker could possibly use this issue to perform an HTTP request\nsplitting attack, resulting in cache poisoning. (CVE-2020-15811)\n\nLubos Uhliarik discovered that Squid incorrectly handled certain Cache\nDigest response messages sent by trusted peers. A remote attacker could\npossibly use this issue to cause Squid to consume resources, resulting in a\ndenial of service. (CVE-2020-24606)\n","modified":"2026-02-10T04:41:54Z","published":"2020-08-27T17:13:52Z","related":["UBUNTU-CVE-2020-15810","UBUNTU-CVE-2020-15811","UBUNTU-CVE-2020-24606"],"upstream":["CVE-2020-15810","CVE-2020-15811","CVE-2020-24606","UBUNTU-CVE-2020-15810","UBUNTU-CVE-2020-15811","UBUNTU-CVE-2020-24606"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4477-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-15810"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-15811"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-24606"}],"affected":[{"package":{"name":"squid","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/squid@4.10-1ubuntu1.2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.10-1ubuntu1.2"}]}],"versions":["4.8-1ubuntu2","4.8-1ubuntu3","4.9-2ubuntu1","4.9-2ubuntu2","4.9-2ubuntu3","4.9-2ubuntu4","4.10-1ubuntu1","4.10-1ubuntu1.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.10-1ubuntu1.2","binary_name":"squid"},{"binary_version":"4.10-1ubuntu1.2","binary_name":"squid-cgi"},{"binary_version":"4.10-1ubuntu1.2","binary_name":"squid-common"},{"binary_version":"4.10-1ubuntu1.2","binary_name":"squid-purge"},{"binary_version":"4.10-1ubuntu1.2","binary_name":"squidclient"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4477-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-15810"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2020-15811"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24606"}]}}}],"schema_version":"1.7.3"}