CVE-2015-3455

Priority
Description
Squid 3.2.x before 3.2.14, 3.3.x before 3.3.14, 3.4.x before 3.4.13, and
3.5.x before 3.5.4, when configured with client-first SSL-bump, do not
properly validate the domain or hostname fields of X.509 certificates,
which allows man-in-the-middle attackers to spoof SSL servers via a valid
certificate.
Notes
 mdeslaur> only an issue if squid3 is built with --enable-ssl, which isn't
 mdeslaur> the case on debian/ubuntu for licensing reasons.
 mdeslaur> However, we should probably fix this anyway as rebuilding
 mdeslaur> the Ubuntu package locally to enable ssl is a common scenario.
 mdeslaur> 3.1.x not affected
Assigned-to
mdeslaur
Package
Upstream:released (3.5.4,3.4.13,3.3.14,3.2.14)
Ubuntu 14.04 LTS (Trusty Tahr):released (3.3.8-1ubuntu6.6)
Ubuntu 16.04 LTS (Xenial Xerus):released (3.5.12-1ubuntu6)
Patches:
Upstream:http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12690.patch (3.3)
More Information

Updated: 2019-03-19 12:18:57 UTC (commit 15472795df7e9de45b82f2d36b8b419b939f97b2)