CVE-2021-28652

medium

Description

An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.

References

https://www.debian.org/security/2021/dsa-4924

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/

https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html

https://github.com/squid-cache/squid/security/advisories/GHSA-m47m-9hvw-7447

https://bugs.squid-cache.org/show_bug.cgi?id=5106

http://www.openwall.com/lists/oss-security/2023/10/11/3

http://seclists.org/fulldisclosure/2023/Oct/14

Details

Source: Mitre, NVD

Published: 2021-05-27

Updated: 2023-11-07

Risk Information

CVSS v2

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 4.9

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

Severity: Medium