Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-5824
HistoryNov 03, 2023 - 12:00 a.m.

CVE-2023-5824

2023-11-0300:00:00
ubuntu.com
ubuntu.com
12
squid
dos attack
http
https
improper handling

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.6%

Squid is vulnerable to Denial of Service attack against HTTP and HTTPS
clients due to an Improper Handling of Structural Elements bug.

Bugs

Notes

Author Note
mdeslaur as of 2024-01-26, this is not fixed in the upstream 5.x repository. The patches to fix this issue are large and intrusive. Per the researcher’s advisory, “Of course, such ‘attacks’ are completely theoretical and are only considered for entertainment purposes.” Ubuntu 20.04 LTS was patched in USN-6728-1, but the fix introduced crashes and was backed out in USN-6728-2. It was ultimately fixed in USN-6728-3.
OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchsquid< 4.10-1ubuntu1.12UNKNOWN
ubuntu22.04noarchsquid< 5.7-0ubuntu0.22.04.4UNKNOWN
ubuntu23.10noarchsquid< 6.1-2ubuntu1.3UNKNOWN
ubuntu24.04noarchsquid< 6.5-1ubuntu1UNKNOWN
ubuntu18.04noarchsquid3< anyUNKNOWN
ubuntu16.04noarchsquid3< anyUNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.6%