An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Squid | Squid-cache | 1.0 (including) | 4.15 (excluding) |
Squid | Squid-cache | 5.0 (including) | 5.0.6 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | squid:4-8050020210618131503.b4937e53 | * |
Squid | Ubuntu | devel | * |
Squid | Ubuntu | focal | * |
Squid | Ubuntu | groovy | * |
Squid | Ubuntu | hirsute | * |
Squid | Ubuntu | impish | * |
Squid | Ubuntu | jammy | * |
Squid | Ubuntu | trusty | * |
Squid | Ubuntu | upstream | * |
Squid3 | Ubuntu | bionic | * |
Squid3 | Ubuntu | esm-infra/xenial | * |
Squid3 | Ubuntu | trusty | * |
Squid3 | Ubuntu | xenial | * |