Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.
When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Squid | Squid-cache | 5.0.3 (including) | 6.4 (excluding) |
Red Hat Enterprise Linux 9 | RedHat | squid-7:5.5-5.el9_2.1 | * |
Red Hat Enterprise Linux 9 | RedHat | squid-7:5.5-6.el9_3.1 | * |
Red Hat Enterprise Linux 9.0 Extended Update Support | RedHat | squid-7:5.2-1.el9_0.3 | * |
Squid | Ubuntu | bionic | * |
Squid | Ubuntu | devel | * |
Squid | Ubuntu | jammy | * |
Squid | Ubuntu | lunar | * |
Squid | Ubuntu | mantic | * |
Squid | Ubuntu | trusty | * |
Squid | Ubuntu | upstream | * |
Squid | Ubuntu | xenial | * |
Squid3 | Ubuntu | bionic | * |
Squid3 | Ubuntu | trusty | * |
Squid3 | Ubuntu | xenial | * |