Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Squid 2.0 < 4.14, 5.0.1 < 5.0.5 DoS Vulnerability (SQUID-2021:1)

Information

Severity

Severity

High

Family

Family

Denial of Service

CVSSv2 Base

CVSSv2 Base

7.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

1 year ago

Modified

Modified

1 year ago

Summary

Squid is prone to a denial of service (DoS) vulnerability in the URN processing.

Insight

Insight

Due to a buffer management bug Squid is vulnerable to a DoS attack against the server it is operating on. This attack is limited to proxies which attempt to resolve a 'urn:' resource identifier. Support for this resolving is enabled by default in all Squid. This problem allows a malicious server in collaboration with a trusted client to consume arbitrarily large amounts of memory on the server running Squid. Lack of available memory resources impacts all services on the machine running Squid. Once initiated the DoS situation will persist until Squid is shutdown.

Affected Software

Affected Software

Squid version 2.0 through 4.14 and 5.0.1 through 5.0.5.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to version 4.15, 5.0.6 or later. See the referenced vendor advisory for a workaround.

Common Vulnerabilities and Exposures (CVE)