A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
Metrics
Affected Vendors & Products
References
History
Thu, 24 Oct 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug. | A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service. |
Mon, 16 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2023-11-03T07:56:36.369Z
Updated: 2024-10-24T17:54:45.081Z
Reserved: 2023-10-27T09:37:47.593Z
Link: CVE-2023-5824
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-11-03T08:15:08.270
Modified: 2024-10-24T18:15:05.393
Link: CVE-2023-5824
Redhat