Assigner | redhat |
Reserved | 2023-10-27 |
Published | 2023-11-03 |
Updated | 2024-05-01 |
Description
Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
Problem types
Incorrect Conversion between Numeric Types
Product status
7:5.5-5.el9_2.1 before *
7:5.5-6.el9_3.1 before *
7:5.2-1.el9_0.3 before *
Timeline
2023-10-24: | Reported to Red Hat. |
2023-10-19: | Made public. |
References
https://access.redhat.com/errata/RHSA-2023:6266 (RHSA-2023:6266)
https://access.redhat.com/errata/RHSA-2023:6268 (RHSA-2023:6268)
https://access.redhat.com/errata/RHSA-2023:6748 (RHSA-2023:6748)
https://access.redhat.com/security/cve/CVE-2023-46848
https://bugzilla.redhat.com/show_bug.cgi?id=2245919 (RHBZ#2245919)
https://github.com/squid-cache/squid/security/advisories/GHSA-2g3c-pg7q-g59w
https://security.netapp.com/advisory/ntap-20231214-0005/