2023-12-05 00:55:22 +00:00
{
"id" : "CVE-2023-49285" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2023-12-04T23:15:27.007" ,
2024-01-19 17:00:29 +00:00
"lastModified" : "2024-01-19T16:15:09.653" ,
2023-12-29 05:00:29 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-05 00:55:22 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability."
2023-12-05 15:01:07 +00:00
} ,
{
"lang" : "es" ,
"value" : "Squid es un proxy de almacenamiento en cach\u00e9 para la Web que admite HTTP, HTTPS, FTP y m\u00e1s. Debido a un error de sobrelectura del b\u00fafer, Squid es vulnerable a un ataque de denegaci\u00f3n de servicio contra el procesamiento de mensajes HTTP de Squid. Este error se solucion\u00f3 con la versi\u00f3n 6.5 de Squid. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
2023-12-05 00:55:22 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-12-08 19:00:22 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
} ,
2023-12-05 00:55:22 +00:00
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.0
}
]
} ,
"weaknesses" : [
{
2023-12-08 19:00:22 +00:00
"source" : "nvd@nist.gov" ,
2023-12-05 00:55:22 +00:00
"type" : "Primary" ,
2023-12-08 19:00:22 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-125"
}
]
} ,
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
2023-12-05 00:55:22 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-126"
}
]
}
] ,
2023-12-08 19:00:22 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "6.4" ,
"matchCriteriaId" : "64A6EFAB-804C-4B6B-B609-2F5A797EACB0"
}
]
}
]
}
] ,
2023-12-05 00:55:22 +00:00
"references" : [
{
"url" : "http://www.squid-cache.org/Versions/v5/SQUID-2023_7.patch" ,
2023-12-08 19:00:22 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Broken Link"
]
2023-12-05 00:55:22 +00:00
} ,
{
"url" : "http://www.squid-cache.org/Versions/v6/SQUID-2023_7.patch" ,
2023-12-08 19:00:22 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Broken Link"
]
2023-12-05 00:55:22 +00:00
} ,
{
"url" : "https://github.com/squid-cache/squid/commit/77b3fb4df0f126784d5fd4967c28ed40eb8d521b" ,
2023-12-08 19:00:22 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2023-12-05 00:55:22 +00:00
} ,
{
"url" : "https://github.com/squid-cache/squid/commit/deee944f9a12c9fd399ce52f3e2526bb573a9470" ,
2023-12-08 19:00:22 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2023-12-05 00:55:22 +00:00
} ,
{
"url" : "https://github.com/squid-cache/squid/security/advisories/GHSA-8w9r-p88v-mmx9" ,
2023-12-08 19:00:22 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Vendor Advisory"
]
2023-12-29 05:00:29 +00:00
} ,
2024-01-09 03:00:36 +00:00
{
"url" : "https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html" ,
"source" : "security-advisories@github.com"
} ,
2023-12-29 05:00:29 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/" ,
"source" : "security-advisories@github.com"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/" ,
"source" : "security-advisories@github.com"
2024-01-19 17:00:29 +00:00
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20240119-0004/" ,
"source" : "security-advisories@github.com"
2023-12-05 00:55:22 +00:00
}
]
}