First published: Thu May 20 2021(Updated: )
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/squid | <=4.6-1+deb10u5<=4.6-1<=4.13-9<=4.6-1+deb10u4 | 4.13-10 4.6-1+deb10u6 |
Squid-Cache Squid | >=1.0<4.15 | |
Squid-Cache Squid | >=5.0<5.0.6 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in Squid is CVE-2021-28652.
The severity of CVE-2021-28652 is high.
CVE-2021-28652 allows a trusted client to trigger memory leaks that over time lead to a Denial of Service attack against the Cache Manager API.
Versions before 4.15 and 5.x before 5.0.6 of Squid are affected by CVE-2021-28652.
To fix the vulnerability in Squid, update to version 4.15 or 5.0.6 or later.