First published: Mon May 24 2021(Updated: )
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | <4.15 | |
Squid-Cache Squid | >=5.0<5.0.6 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
NetApp Cloud Manager | ||
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31806 is a vulnerability in Squid before 4.15 and 5.x before 5.0.6 that allows a Denial of Service attack via HTTP Range request processing.
CVE-2021-31806 has a severity rating of 6.5 (high).
CVE-2021-31806 affects Squid versions before 4.15 and 5.x before 5.0.6.
To fix CVE-2021-31806, update Squid to version 4.15 or 5.0.6 or later.
You can find more information about CVE-2021-31806 on the Debian security tracker website.