First published: Tue Mar 09 2021(Updated: )
Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/squid | 4.6-1+deb10u7 4.6-1+deb10u8 4.13-10+deb11u2 5.7-2 6.3-1 | |
Squid-Cache Squid | <=4.14 | |
Squid-Cache Squid | >=5.0<=5.0.5 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28116 is a vulnerability in Squid versions 4.14 and 5.x through 5.0.5 that allows information disclosure through an out-of-bounds read in the WCCP protocol data.
CVE-2021-28116 has a severity rating of 5.3, which is considered medium.
CVE-2021-28116 can be leveraged as part of a chain for remote code execution.
Squid versions 4.6-1+deb10u7, 4.6-1+deb10u8, 4.13-10+deb11u2, 5.7-2, and 6.3-1 are affected, as well as Squid-Cache Squid versions up to 4.14 and versions up to 5.0.5.
To mitigate CVE-2021-28116, it is recommended to upgrade to a fixed version of Squid or follow the recommended remedies provided by the vendor.