First published: Sun Jul 17 2022(Updated: )
In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | >=3.0<=3.5.28 | |
Squid-Cache Squid | >=4.0<=4.17 | |
Squid-Cache Squid | >=5.0<5.6 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
debian/squid | 4.13-10+deb11u3 5.7-2+deb12u1 6.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-46784.
The severity level of CVE-2021-46784 is medium (6.5).
Squid versions 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6 are affected by CVE-2021-46784.
CVE-2021-46784 can cause a Denial of Service (DoS) when processing long Gopher server responses.
To fix CVE-2021-46784, it is recommended to update to Squid versions 4.6-1+deb10u7, 4.6-1+deb10u8, 4.13-10+deb11u2, or 5.7-2 (or later).