CVE Vulnerabilities

CVE-2024-23638

Operation on a Resource after Expiration or Release

Published: Jan 24, 2024 | Modified: Apr 25, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squids patch archives. As a workaround, prevent access to Cache Manager using Squids main access control: http_access deny manager.

Weakness

The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.

Affected Software

Name Vendor Start Version End Version
Squid Squid-cache 5.0 (including) 5.9 (including)
Squid Squid-cache 6.0 (including) 6.6 (excluding)
Red Hat Enterprise Linux 8 RedHat squid:4-8100020241113143337.489197e6 *
Red Hat Enterprise Linux 9 RedHat squid-7:5.5-13.el9_4 *
Squid Ubuntu devel *
Squid Ubuntu focal *
Squid Ubuntu jammy *
Squid Ubuntu lunar *
Squid Ubuntu mantic *
Squid Ubuntu noble *
Squid Ubuntu oracular *
Squid Ubuntu upstream *
Squid3 Ubuntu bionic *
Squid3 Ubuntu trusty *
Squid3 Ubuntu xenial *

References