First published: Tue Oct 24 2023(Updated: )
A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | <6.4 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
redhat/squid | <6.4 | 6.4 |
debian/squid | <=4.13-10+deb11u3<=5.7-2+deb12u2 | 6.12-1 |
<6.4 | ||
=6.0 | ||
=7.0 | ||
=8.0 | ||
=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Squid vulnerability is CVE-2023-5824.
The title of this vulnerability is 'Squid: dos against http and https'.
The description of this vulnerability is 'Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug.'
The severity rating of this vulnerability is critical (9.6).
The affected software is Squid version up to (but not including) 6.4, Redhat Enterprise Linux versions 6.0 to 9.0.
More information about this vulnerability can be found at the following references: [1](https://access.redhat.com/security/cve/CVE-2023-5824), [2](https://bugzilla.redhat.com/show_bug.cgi?id=2245914), [3](https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255).