Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2024-23638

Published: 24 January 2024

Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. As a workaround, prevent access to Cache Manager using Squid's main access control: `http_access deny manager`.

Priority

Medium

Cvss 3 Severity Score

6.5

Score breakdown

Status

Package Release Status
squid
Launchpad, Ubuntu, Debian
bionic Does not exist

focal
Released (4.10-1ubuntu1.10)
jammy
Released (5.7-0ubuntu0.22.04.4)
lunar Ignored
(end of life, was needs-triage)
mantic
Released (6.1-2ubuntu1.3)
trusty Does not exist

upstream
Released (6.6-1)
xenial Does not exist

Patches:
upstream: https://github.com/squid-cache/squid/commit/290ae202883ac28a48867079c2fb34c40efd382b
upstream: https://github.com/squid-cache/squid/commit/61c9e763b4baa69facbd502aacb991f2bfa31293
upstream: http://www.squid-cache.org/Versions/v5/SQUID-2023_11.patch
upstream: http://www.squid-cache.org/Versions/v6/SQUID-2023_11.patch
squid3
Launchpad, Ubuntu, Debian
bionic Needs triage

focal Does not exist

jammy Does not exist

lunar Does not exist

mantic Does not exist

trusty Ignored
(end of standard support)
upstream Needs triage

xenial Needs triage

Severity score breakdown

Parameter Value
Base score 6.5
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H