CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS
Percentile
85.8%
Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform
Denial of Service by consuming all available CPU cycles during handling of
a crafted Cache Digest response message. This only occurs when cache_peer
is used with the cache digests feature. The problem exists because
peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg
launchpad.net/bugs/cve/CVE-2020-24606
nvd.nist.gov/vuln/detail/CVE-2020-24606
security-tracker.debian.org/tracker/CVE-2020-24606
ubuntu.com/security/notices/USN-4477-1
ubuntu.com/security/notices/USN-4551-1
www.cve.org/CVERecord?id=CVE-2020-24606
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS
Percentile
85.8%