A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
History

Thu, 24 Oct 2024 18:00:00 +0000

Type Values Removed Values Added
Description Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug. A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.

Mon, 16 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2023-11-03T07:56:36.369Z

Updated: 2024-10-24T17:54:45.081Z

Reserved: 2023-10-27T09:37:47.593Z

Link: CVE-2023-5824

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-03T08:15:08.270

Modified: 2024-10-24T18:15:05.393

Link: CVE-2023-5824

cve-icon Redhat

Severity : Important

Publid Date: 2023-10-19T00:00:00Z

Links: CVE-2023-5824 - Bugzilla