First published: Thu May 27 2021(Updated: )
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to an input-validation bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy). A client sends an HTTP Range request to trigger this.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | <4.15 | |
Squid-Cache Squid | >=5.0<5.0.6 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
NetApp Cloud Manager | ||
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u2 6.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31808 is a vulnerability in Squid before 4.15 and 5.x before 5.0.6 that allows for a Denial of Service attack.
CVE-2021-31808 affects all clients using the Squid proxy, as it is vulnerable to a Denial of Service attack triggered by an HTTP Range request.
CVE-2021-31808 has a severity rating of 6.5 (medium).
CVE-2021-31808 affects Squid versions before 4.15 and 5.x before 5.0.6.
Yes, there are patches available. Please refer to the references provided for more information.