Advisory Published
Updated

REDHAT-BUG-2260051

First published: Wed Jan 24 2024(Updated: )

Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. As a workaround, prevent access to Cache Manager using Squid's main access control: `http_access deny manager`. <a href="http://www.squid-cache.org/Versions/v5/SQUID-2023_11.patch">http://www.squid-cache.org/Versions/v5/SQUID-2023_11.patch</a> <a href="http://www.squid-cache.org/Versions/v6/SQUID-2023_11.patch">http://www.squid-cache.org/Versions/v6/SQUID-2023_11.patch</a> <a href="https://github.com/squid-cache/squid/commit/290ae202883ac28a48867079c2fb34c40efd382b">https://github.com/squid-cache/squid/commit/290ae202883ac28a48867079c2fb34c40efd382b</a> <a href="https://github.com/squid-cache/squid/commit/e8118a7381213f5cfcdeb4cec1d2d854bfd261c8">https://github.com/squid-cache/squid/commit/e8118a7381213f5cfcdeb4cec1d2d854bfd261c8</a> <a href="https://github.com/squid-cache/squid/security/advisories/GHSA-j49p-553x-48rx">https://github.com/squid-cache/squid/security/advisories/GHSA-j49p-553x-48rx</a> <a href="https://megamansec.github.io/Squid-Security-Audit/stream-assert.html">https://megamansec.github.io/Squid-Security-Audit/stream-assert.html</a>

Affected SoftwareAffected VersionHow to fix
Squid Web Proxy Cache<=6.5<=5.9>5.0.5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of REDHAT-BUG-2260051?

    REDHAT-BUG-2260051 is classified as a Denial of Service vulnerability affecting Squid prior to version 6.6.

  • How do I fix REDHAT-BUG-2260051?

    To fix REDHAT-BUG-2260051, upgrade Squid to version 6.6 or later.

  • Which versions of Squid are affected by REDHAT-BUG-2260051?

    REDHAT-BUG-2260051 affects Squid versions up to and including 6.5 and versions starting from 5.0.5 up to 5.9.

  • What type of attack does REDHAT-BUG-2260051 facilitate?

    REDHAT-BUG-2260051 facilitates a Denial of Service attack against Cache Manager error responses in Squid.

  • Who can exploit REDHAT-BUG-2260051?

    A trusted client can exploit REDHAT-BUG-2260051 to generate Denial of Service by triggering error pages.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203