We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)
Bugpilot (Bug tracking)

Ok

THREATINT CVE Home CVE Diag Help
PUBLISHED

CVE-2023-46848

Squid: denial of service in ftp

Reserved:2023-10-27
Published:2023-11-03
Updated:2024-04-03

Description

Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.



HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Problem types

Incorrect Conversion between Numeric Types

Product status

6.4
unaffected

Default status
affected

7:5.5-5.el9_2.1 before *
unaffected

Default status
affected

7:5.5-6.el9_3.1 before *
unaffected

Default status
affected

7:5.2-1.el9_0.3 before *
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
affected

Timeline

2023-10-24:Reported to Red Hat.
2023-10-19:Made public.

References

https://access.redhat.com/errata/RHSA-2023:6266 (RHSA-2023:6266) vendor-advisory

https://access.redhat.com/errata/RHSA-2023:6268 (RHSA-2023:6268) vendor-advisory

https://access.redhat.com/errata/RHSA-2023:6748 (RHSA-2023:6748) vendor-advisory

https://access.redhat.com/security/cve/CVE-2023-46848 vdb-entry

https://bugzilla.redhat.com/show_bug.cgi?id=2245919 (RHBZ#2245919) issue-tracking

https://github.com/squid-cache/squid/security/advisories/GHSA-2g3c-pg7q-g59w

https://security.netapp.com/advisory/ntap-20231214-0005/

cve.org CVE-2023-46848

nvd.nist.gov CVE-2023-46848

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-46848