CVE-2023-5824
Published: 3 November 2023
Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug.
Notes
Author | Note |
---|---|
mdeslaur |
as of 2024-01-26, this is not fixed in the upstream 5.x repository. The patches to fix this issue are large and intrusive. Per the researcher's advisory, "Of course, such 'attacks' are completely theoretical and are only considered for entertainment purposes." Ubuntu 20.04 LTS was patched in USN-6728-1, but the fix introduced crashes and was backed out in USN-6728-2. It was ultimately fixed in USN-6728-3. |
Priority
Status
Package | Release | Status |
---|---|---|
squid
Launchpad, Ubuntu, Debian |
bionic |
Ignored
(end of standard support)
|
focal |
Released
(4.10-1ubuntu1.12)
|
|
jammy |
Released
(5.7-0ubuntu0.22.04.4)
|
|
lunar |
Ignored
(end of life, was deferred [2024-01-26])
|
|
mantic |
Released
(6.1-2ubuntu1.3)
|
|
noble |
Released
(6.5-1ubuntu1)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Released
(6.5)
|
|
xenial |
Ignored
(end of standard support)
|
|
Patches:
upstream: https://github.com/squid-cache/squid/commit/a27bf4b84da23594150c7a86a23435df0b35b988 upstream: https://github.com/squid-cache/squid/commit/57acdb7dcec38605ede048db82b495ba316e6311 upstream: https://github.com/squid-cache/squid/commit/2f3efe5d9e1c9444cb3f95fc09cbbf52985f37bf upstream: https://github.com/squid-cache/squid/commit/18209199f8c330176401eac7ef2deb06ca4389b9 vendor: https://git.rockylinux.org/staging/rpms/squid/-/blob/r9/SOURCES/squid-5.5-CVE-2023-5824.patch vendor: https://git.rockylinux.org/staging/rpms/squid/-/blob/r8-stream-4/SOURCES/squid-4.15-CVE-2023-5824.patch |
||
squid3
Launchpad, Ubuntu, Debian |
bionic |
Needed
|
focal |
Does not exist
|
|
jammy |
Does not exist
|
|
lunar |
Does not exist
|
|
mantic |
Does not exist
|
|
noble |
Does not exist
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Needed
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
- https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255
- https://lists.squid-cache.org/pipermail/squid-announce/2023-October/000155.html
- https://megamansec.github.io/Squid-Security-Audit/cache-headers.html
- https://ubuntu.com/security/notices/USN-6728-1
- https://ubuntu.com/security/notices/USN-6728-2
- https://www.cve.org/CVERecord?id=CVE-2023-5824
- https://ubuntu.com/security/notices/USN-6728-3
- NVD
- Launchpad
- Debian