First published: Thu May 20 2021(Updated: )
An issue was discovered in Squid 4.x before 4.15 and 5.x before 5.0.6. If a remote server sends a certain response header over HTTP or HTTPS, there is a denial of service. This header can plausibly occur in benign network traffic.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/squid | <=4.6-1+deb10u4<=4.6-1<=4.13-9<=4.6-1+deb10u5 | 4.13-10 4.6-1+deb10u6 |
Squid-Cache Squid | >=4.0.1<4.15 | |
Squid-Cache Squid | >=5.0<5.0.6 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28662 is a vulnerability discovered in Squid 4.x before 4.15 and 5.x before 5.0.6.
CVE-2021-28662 has a severity rating of 6.5 (high).
CVE-2021-28662 can result in a denial of service if a remote server sends a specific response header over HTTP or HTTPS.
To fix CVE-2021-28662, update Squid to version 4.15 or 5.0.6, depending on the version you are using.
You can find more information about CVE-2021-28662 on the following references: [1] [2] [3].