First published: Tue Oct 24 2023(Updated: )
Description: Due to a buffer overflow bug Squid is vulnerable to a Denial of Service attack against HTTP Digest Authentication Reference: <a href="https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g">https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g</a> Affected versions: 3.2.0.1-5.9, 6.0-6.3
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | >=3.2.0.1<6.4 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Eus | =8.8 | |
Redhat Enterprise Linux Eus | =9.0 | |
Redhat Enterprise Linux Eus | =9.2 | |
Redhat Enterprise Linux For Arm 64 | =8.0_aarch64 | |
Redhat Enterprise Linux For Ibm Z Systems | =8.0_s390x | |
Redhat Enterprise Linux For Power Little Endian | =8.0_ppc64le | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Aus | =8.6 | |
Redhat Enterprise Linux Server Aus | =9.2 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.6 | |
Redhat Enterprise Linux Server Tus | =8.8 | |
Redhat Enterprise Linux Server Tus | =9.2 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/squid | <6.4 | 6.4 |
ubuntu/squid | <4.10-1ubuntu1.8 | 4.10-1ubuntu1.8 |
ubuntu/squid | <5.7-0ubuntu0.22.04.2 | 5.7-0ubuntu0.22.04.2 |
ubuntu/squid | <5.7-1ubuntu3.1 | 5.7-1ubuntu3.1 |
ubuntu/squid | <6.1-2ubuntu1.1 | 6.1-2ubuntu1.1 |
ubuntu/squid | <6.4 | 6.4 |
ubuntu/squid3 | <3.5.27-1ubuntu1.14+ | 3.5.27-1ubuntu1.14+ |
ubuntu/squid3 | <3.5.12-1ubuntu7.16+ | 3.5.12-1ubuntu7.16+ |
debian/squid | <=4.6-1+deb10u7<=4.13-10+deb11u2<=5.7-2 | 4.6-1+deb10u10 4.13-10+deb11u3 5.7-2+deb12u1 6.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46847 is a vulnerability in Squid that allows a remote attacker to perform a denial of service attack through a buffer overflow in HTTP Digest Authentication.
CVE-2023-46847 has a severity rating of 9.9, which is classified as critical.
The affected software versions include Squid up to version 6.4 and Squid-Cache versions 3.2.0.1 to 6.4.
To mitigate CVE-2023-46847, update Squid to version 6.4 or apply the recommended patches provided by the vendor.
You can find more information about CVE-2023-46847 in the references: [GitHub Advisory](https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2245917), and [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2023:6266).