A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 24 Oct 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug. | A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service. |
Mon, 16 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-11-23T03:19:19.791Z
Reserved: 2023-10-27T09:37:47.593Z
Link: CVE-2023-5824

No data.

Status : Modified
Published: 2023-11-03T08:15:08.270
Modified: 2024-11-21T08:42:34.053
Link: CVE-2023-5824
