8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.5 High
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
72.8%
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with “collapsed_forwarding on” are vulnerable. Configurations with “collapsed_forwarding off” or without a “collapsed_forwarding” directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | squid | <= 5.7-2 | squid_5.7-2_all.deb |
Debian | 11 | all | squid | <= 4.13-10+deb11u2 | squid_4.13-10+deb11u2_all.deb |
Debian | 10 | all | squid | <= 4.6-1+deb10u7 | squid_4.6-1+deb10u7_all.deb |
Debian | 999 | all | squid | < 6.1-1 | squid_6.1-1_all.deb |
Debian | 13 | all | squid | < 6.1-1 | squid_6.1-1_all.deb |
8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.5 High
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
72.8%