8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
7.7 High
AI Score
Confidence
Low
0.03 Low
EPSS
Percentile
91.0%
Issue Overview:
Due to a buffer overflow bug Squid is vulnerable to a Denial of Service attack against HTTP Digest Authentication (CVE-2023-46847)
Affected Packages:
squid
Issue Correction:
Run yum update squid to update your system.
New Packages:
i686:
squid-3.5.20-17.50.amzn1.i686
squid-debuginfo-3.5.20-17.50.amzn1.i686
squid-migration-script-3.5.20-17.50.amzn1.i686
src:
squid-3.5.20-17.50.amzn1.src
x86_64:
squid-3.5.20-17.50.amzn1.x86_64
squid-debuginfo-3.5.20-17.50.amzn1.x86_64
squid-migration-script-3.5.20-17.50.amzn1.x86_64
Red Hat: CVE-2023-46847
Mitre: CVE-2023-46847
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | squid | < 3.5.20-17.50.amzn1 | squid-3.5.20-17.50.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | squid-debuginfo | < 3.5.20-17.50.amzn1 | squid-debuginfo-3.5.20-17.50.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | squid-migration-script | < 3.5.20-17.50.amzn1 | squid-migration-script-3.5.20-17.50.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | squid | < 3.5.20-17.50.amzn1 | squid-3.5.20-17.50.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | squid-debuginfo | < 3.5.20-17.50.amzn1 | squid-debuginfo-3.5.20-17.50.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | squid-migration-script | < 3.5.20-17.50.amzn1 | squid-migration-script-3.5.20-17.50.amzn1.x86_64.rpm |
8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
7.7 High
AI Score
Confidence
Low
0.03 Low
EPSS
Percentile
91.0%