Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.
When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:6266 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:6268 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:6748 | third party advisory vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-46848 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2245919 | issue tracking |
https://github.com/squid-cache/squid/security/advisories/GHSA-2g3c-pg7q-g59w | vendor advisory |
https://security.netapp.com/advisory/ntap-20231214-0005/ |