Use After Free Affecting squid-migration-script package, versions *


Severity

Recommended
medium

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
1.86% (83rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-SQUIDMIGRATIONSCRIPT-6100632
  • published5 Dec 2023
  • disclosed5 Dec 2023

Introduced: 5 Dec 2023

CVE-2023-49288  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:7 squid-migration-script.

NVD Description

Note: Versions mentioned in the description apply only to the upstream squid-migration-script package and not the squid-migration-script package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.

CVSS Base Scores

version 3.1