Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2023:6266 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2023:6268 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2023:6748 | Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2023-46848 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2245919 | Issue Tracking |
https://github.com/squid-cache/squid/security/advisories/GHSA-2g3c-pg7q-g59w | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
16 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Dec 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Dec 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-03 08:15
Updated : 2024-09-16 16:15
NVD link : CVE-2023-46848
Mitre link : CVE-2023-46848
CVE.ORG link : CVE-2023-46848
JSON object : View
Products Affected
redhat
- enterprise_linux_server_tus
- enterprise_linux_server_aus
- enterprise_linux
- enterprise_linux_eus
squid-cache
- squid
CWE
CWE-681
Incorrect Conversion between Numeric Types