CVE-2021-28652
Published: 27 May 2021
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.
Notes
Author | Note |
---|---|
mdeslaur |
this issue only affects the Cache Manager, which is usually restricted to trusted clients only. The patch is intrusive to backport to 3.x versions, so we will not be fixing this issue in older releases. We recommend setting appropriate access control to limit connections from trusted clients. |
Priority
Status
Package | Release | Status |
---|---|---|
squid
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Released
(4.10-1ubuntu1.4)
|
|
groovy |
Released
(4.13-1ubuntu2.2)
|
|
hirsute |
Released
(4.13-1ubuntu4.1)
|
|
impish |
Released
(4.13-10ubuntu1)
|
|
jammy |
Released
(4.13-10ubuntu1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.15,4.13-10)
|
|
xenial |
Does not exist
|
|
Patches:
upstream: http://www.squid-cache.org/Versions/v4/changesets/squid-4-0003e3518dc95e4b5ab46b5140af79b22253048e.patch upstream: https://github.com/squid-cache/squid/commit/0003e3518dc95e4b5ab46b5140af79b22253048e |
||
squid3
Launchpad, Ubuntu, Debian |
bionic |
Released
(3.5.27-1ubuntu1.11)
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Ignored
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.9 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | High |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |