Vulnerability Description
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Squid-Cache | Squid | >= 3.5, <= 5.9 |
Related Weaknesses (CWE)
References
- https://github.com/squid-cache/squid/security/advisories/GHSA-rj5h-46j6-q2g5Vendor Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://security.netapp.com/advisory/ntap-20240119-0006/
- https://github.com/squid-cache/squid/security/advisories/GHSA-rj5h-46j6-q2g5Vendor Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://security.netapp.com/advisory/ntap-20240119-0006/
FAQ
What is CVE-2023-49288?
CVE-2023-49288 is a vulnerability with a CVSS score of 8.6 (HIGH). Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed ...
How severe is CVE-2023-49288?
CVE-2023-49288 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-49288?
Check the references section above for vendor advisories and patch information. Affected products include: Squid-Cache Squid.