7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
Issue Overview:
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecified attack methodology that can easily trigger a large amount of memory consumption. (CVE-2021-28651)
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege. (CVE-2021-28652)
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing. (CVE-2021-31806)
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. An integer overflow problem allows a remote server to achieve Denial of Service when delivering responses to HTTP Range requests. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent. (CVE-2021-31807)
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to an input-validation bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy). A client sends an HTTP Range request to trigger this. (CVE-2021-31808)
Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server. (CVE-2021-33620)
A flaw was found in squid. A trusted client can directly access the cache manager information, bypassing the manager ACL protection and resulting in information disclosure. (CVE-2022-41317)
Affected Packages:
squid
Issue Correction:
Run yum update squid to update your system.
New Packages:
i686:
squid-migration-script-3.5.20-17.44.amzn1.i686
squid-3.5.20-17.44.amzn1.i686
squid-debuginfo-3.5.20-17.44.amzn1.i686
src:
squid-3.5.20-17.44.amzn1.src
x86_64:
squid-debuginfo-3.5.20-17.44.amzn1.x86_64
squid-migration-script-3.5.20-17.44.amzn1.x86_64
squid-3.5.20-17.44.amzn1.x86_64
Red Hat: CVE-2021-28651, CVE-2021-28652, CVE-2021-31806, CVE-2021-31807, CVE-2021-31808, CVE-2021-33620, CVE-2022-41317
Mitre: CVE-2021-28651, CVE-2021-28652, CVE-2021-31806, CVE-2021-31807, CVE-2021-31808, CVE-2021-33620, CVE-2022-41317
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | squid-migration-script | < 3.5.20-17.44.amzn1 | squid-migration-script-3.5.20-17.44.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | squid | < 3.5.20-17.44.amzn1 | squid-3.5.20-17.44.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | squid-debuginfo | < 3.5.20-17.44.amzn1 | squid-debuginfo-3.5.20-17.44.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | squid-debuginfo | < 3.5.20-17.44.amzn1 | squid-debuginfo-3.5.20-17.44.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | squid-migration-script | < 3.5.20-17.44.amzn1 | squid-migration-script-3.5.20-17.44.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | squid | < 3.5.20-17.44.amzn1 | squid-3.5.20-17.44.amzn1.x86_64.rpm |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P