[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2SQUID4-2023-004 --- squid

ID: oval:org.secpod.oval:def:1701759Date: (C)2023-10-10   (M)2024-04-25
Class: PATCHFamily: unix




Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody. An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecified attack methodology that can easily trigger a large amount of memory consumption. An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege. An issue was discovered in Squid 4.x before 4.15 and 5.x before 5.0.6. If a remote server sends a certain response header over HTTP or HTTPS, there is a denial of service. This header can plausibly occur in benign network traffic. An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack via HTTP Range request processing. An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. An integer overflow problem allows a remote server to achieve Denial of Service when delivering responses to HTTP Range requests. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent. An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to an input-validation bug, it is vulnerable to a Denial of Service attack . A client sends an HTTP Range request to trigger this. Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server

Platform:
Amazon Linux 2
Product:
squid
Reference:
ALAS2SQUID4-2023-004
CVE-2021-28116
CVE-2021-28651
CVE-2021-28652
CVE-2021-28662
CVE-2021-31806
CVE-2021-31807
CVE-2021-31808
CVE-2021-33620
CVE    8
CVE-2021-28116
CVE-2021-31808
CVE-2021-31807
CVE-2021-28662
...

© SecPod Technologies