An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://bugs.squid-cache.org/show_bug.cgi?id=5106 | vendor advisory issue tracking exploit |
https://github.com/squid-cache/squid/security/advisories/GHSA-m47m-9hvw-7447 | third party advisory patch |
https://www.debian.org/security/2021/dsa-4924 | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2023/10/11/3 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2023/Oct/14 | third party advisory mailing list |