First published: Mon Dec 04 2023(Updated: )
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | >=3.5<=5.9 | |
debian/squid | <=4.6-1+deb10u7<=4.6-1+deb10u10<=4.13-10+deb11u2<=4.13-10+deb11u3<=5.7-2<=5.7-2+deb12u1 | 6.6-1 6.9-1 |
ubuntu/squid | <5.7-0ubuntu0.22.04.4 | 5.7-0ubuntu0.22.04.4 |
ubuntu/squid | <6.1-1 | 6.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-49288.
The title of this vulnerability is Denial of Service in HTTP Collapsed Forwarding in Squid.
The affected software is Squid from version 3.5 up to and including version 5.9.
The severity of this vulnerability is high, with a CVSS score of 8.6.
To fix this vulnerability, it is recommended to update Squid to a version that is not affected by this issue.