Lucene search

K
amazonAmazonALAS-2024-2433
HistoryFeb 01, 2024 - 7:57 p.m.

Medium: squid

2024-02-0119:57:00
alas.aws.amazon.com
6
squid
caching proxy
web
denial of service
cache manager
expired pointer reference
cve-2024-23638

6.8 Medium

AI Score

Confidence

Low

0.009 Low

EPSS

Percentile

82.2%

Issue Overview:

Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid’s patch archives. As a workaround, prevent access to Cache Manager using Squid’s main access control: http_access deny manager. (CVE-2024-23638)

Affected Packages:

squid

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update squid to update your system.

New Packages:

aarch64:  
    squid-3.5.20-17.amzn2.7.17.aarch64  
    squid-sysvinit-3.5.20-17.amzn2.7.17.aarch64  
    squid-migration-script-3.5.20-17.amzn2.7.17.aarch64  
    squid-debuginfo-3.5.20-17.amzn2.7.17.aarch64  
  
i686:  
    squid-3.5.20-17.amzn2.7.17.i686  
    squid-sysvinit-3.5.20-17.amzn2.7.17.i686  
    squid-migration-script-3.5.20-17.amzn2.7.17.i686  
    squid-debuginfo-3.5.20-17.amzn2.7.17.i686  
  
src:  
    squid-3.5.20-17.amzn2.7.17.src  
  
x86_64:  
    squid-3.5.20-17.amzn2.7.17.x86_64  
    squid-sysvinit-3.5.20-17.amzn2.7.17.x86_64  
    squid-migration-script-3.5.20-17.amzn2.7.17.x86_64  
    squid-debuginfo-3.5.20-17.amzn2.7.17.x86_64  

Additional References

Red Hat: CVE-2024-23638

Mitre: CVE-2024-23638