It was found that Squid configured with client-first SSL-bump did not correctly validate X.509 server certificate host name fields. A man-in-the-middle attacker could use this flaw to spoof a Squid server using a specially crafted X.509 certificate.
Find out more about CVE-2015-3455 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue did not affect the versions of squid as shipped with Red Hat Enterprise Linux 5 and 6.
Base Score | 5.8 |
---|---|
Base Metrics | AV:N/AC:M/Au:N/C:P/I:P/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 7 (squid) | RHSA-2015:2378 | 2015-11-19 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 6 | squid | Not affected |
Red Hat Enterprise Linux 5 | squid | Not affected |