8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.8 High
AI Score
Confidence
Low
0.009 Low
EPSS
Percentile
82.4%
USN-6728-1 fixed vulnerabilities in Squid. The fix for CVE-2023-5824 caused
Squid to crash in certain environments on Ubuntu 20.04 LTS. The problematic
fix has been reverted pending further investigation.
We apologize for the inconvenience.
Original advisory details:
Joshua Rogers discovered that Squid incorrectly handled collapsed
forwarding. A remote attacker could possibly use this issue to cause Squid
to crash, resulting in a denial of service. This issue only affected Ubuntu
20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-49288)
Joshua Rogers discovered that Squid incorrectly handled certain structural
elements. A remote attacker could possibly use this issue to cause Squid to
crash, resulting in a denial of service. (CVE-2023-5824)
Joshua Rogers discovered that Squid incorrectly handled Cache Manager error
responses. A remote trusted client can possibly use this issue to cause
Squid to crash, resulting in a denial of service. (CVE-2024-23638)
Joshua Rogers discovered that Squid incorrectly handled the HTTP Chunked
decoder. A remote attacker could possibly use this issue to cause Squid to
stop responding, resulting in a denial of service. (CVE-2024-25111)
Joshua Rogers discovered that Squid incorrectly handled HTTP header
parsing. A remote trusted client can possibly use this issue to cause
Squid to crash, resulting in a denial of service. (CVE-2024-25617)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | squid | < 4.10-1ubuntu1.11 | UNKNOWN |
Ubuntu | 20.04 | noarch | squid-cgi | < 4.10-1ubuntu1.11 | UNKNOWN |
Ubuntu | 20.04 | noarch | squid-cgi-dbgsym | < 4.10-1ubuntu1.11 | UNKNOWN |
Ubuntu | 20.04 | noarch | squid-common | < 4.10-1ubuntu1.11 | UNKNOWN |
Ubuntu | 20.04 | noarch | squid-dbgsym | < 4.10-1ubuntu1.11 | UNKNOWN |
Ubuntu | 20.04 | noarch | squid-purge | < 4.10-1ubuntu1.11 | UNKNOWN |
Ubuntu | 20.04 | noarch | squid-purge-dbgsym | < 4.10-1ubuntu1.11 | UNKNOWN |
Ubuntu | 20.04 | noarch | squidclient | < 4.10-1ubuntu1.11 | UNKNOWN |
Ubuntu | 20.04 | noarch | squidclient-dbgsym | < 4.10-1ubuntu1.11 | UNKNOWN |
8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.8 High
AI Score
Confidence
Low
0.009 Low
EPSS
Percentile
82.4%