cve/2023/CVE-2023-49286.md
2024-05-25 21:48:12 +02:00

19 lines
1002 B
Markdown

### [CVE-2023-49286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49286)
![](https://img.shields.io/static/v1?label=Product&message=squid&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%206.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-253%3A%20Incorrect%20Check%20of%20Function%20Return%20Value&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-617%3A%20Reachable%20Assertion&color=brighgreen)
### Description
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/MegaManSec/Squid-Security-Audit