8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
35.0%
squid is vulnerable to buffer overflow. The vulnerability exists due to a lack of sanitization of the input in SSPI and SMB Authentication allowing an attacker to corrupt the memory.
git://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2022-41318
www.squid-cache.org/Versions/v4/changesets/SQUID-2022_2.patch
www.squid-cache.org/Versions/v5/changesets/SQUID-2022_2.patch
github.com/squid-cache/squid/security/advisories/GHSA-394c-rr7q-6g78
www.openwall.com/lists/oss-security/2022/09/23/2
8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
35.0%