跳转到帖子

Red Hat: CVE-2023-46728: squid: NULL pointer dereference in the gopher protocol code (Multiple Advisories)

recommended_posts

发布于
  • Members

Red Hat: CVE-2023-46728: squid: NULL pointer dereference in the gopher protocol code (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
11/06/2023
Created
01/06/2024
Added
01/05/2024
Modified
09/13/2024

Description

Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.

Solution(s)

  • redhat-upgrade-libecap
  • redhat-upgrade-libecap-debuginfo
  • redhat-upgrade-libecap-debugsource
  • redhat-upgrade-libecap-devel
  • redhat-upgrade-squid
  • redhat-upgrade-squid-debuginfo
  • redhat-upgrade-squid-debugsource
  • redhat-upgrade-squid-migration-script
  • redhat-upgrade-squid-sysvinit

References

  • CVE-2023-46728
  • RHSA-2024:0046
  • RHSA-2024:0071
  • RHSA-2024:0072
  • RHSA-2024:0397
  • RHSA-2024:0771
  • RHSA-2024:1153
  • RHSA-2024:1787
View more
  • 查看数 704
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…