First published: Thu May 20 2021(Updated: )
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecified attack methodology that can easily trigger a large amount of memory consumption.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/squid | <=4.13-9<=4.6-1<=4.6-1+deb10u5 | 4.13-10 4.6-1+deb10u6 |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.12-1 | |
Squid Web Proxy Cache | >=2.0<4.15 | |
Squid Web Proxy Cache | >=5.0<5.0.6 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
NetApp Cloud Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28651 is a vulnerability in Squid before 4.15 and 5.x before 5.0.6 that allows a denial of service.
CVE-2021-28651 allows an attacker to trigger a denial of service condition in Squid.
CVE-2021-28651 has a severity rating of high (7.5).
Yes, there is an unspecified attack methodology that can easily trigger the vulnerability.
To fix CVE-2021-28651, you should update Squid to version 4.15 or 5.0.6 or later, as recommended by the vendor.