Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-25111
HistoryMar 06, 2024 - 6:14 p.m.

CVE-2024-25111 SQUID-2024:1 Denial of Service in HTTP Chunked Decoding

2024-03-0618:14:28
CWE-674
GitHub_M
github.com
6
squid
http
denial of service
vulnerability
chunked decoding

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

6.6

Confidence

High

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid’s patch archives. There is no workaround for this issue.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:netapp:bluexp:-:*:*:*:*:*:*:*"
    ],
    "vendor": "netapp",
    "product": "bluexp",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:squid-cache:squid:3.5.27:*:*:*:*:*:*:*"
    ],
    "vendor": "squid-cache",
    "product": "squid",
    "versions": [
      {
        "status": "affected",
        "version": "3.5.27",
        "lessThan": "6.8",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
    ],
    "vendor": "fedoraproject",
    "product": "fedora",
    "versions": [
      {
        "status": "affected",
        "version": "38"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
    ],
    "vendor": "fedoraproject",
    "product": "fedora",
    "versions": [
      {
        "status": "affected",
        "version": "39"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

6.6

Confidence

High

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial