{"id":"USN-6594-1","summary":"squid vulnerabilities","details":"Joshua Rogers discovered that Squid incorrectly handled HTTP message\nprocessing. A remote attacker could possibly use this issue to cause\nSquid to crash, resulting in a denial of service. (CVE-2023-49285)\n\nJoshua Rogers discovered that Squid incorrectly handled Helper process\nmanagement. A remote attacker could possibly use this issue to cause\nSquid to crash, resulting in a denial of service. (CVE-2023-49286)\n\nJoshua Rogers discovered that Squid incorrectly handled HTTP request\nparsing. A remote attacker could possibly use this issue to cause\nSquid to crash, resulting in a denial of service. (CVE-2023-50269)\n","modified":"2026-02-10T04:43:28Z","published":"2024-01-23T03:05:16Z","related":["UBUNTU-CVE-2023-49285","UBUNTU-CVE-2023-49286","UBUNTU-CVE-2023-50269"],"upstream":["CVE-2023-49285","CVE-2023-49286","CVE-2023-50269","UBUNTU-CVE-2023-49285","UBUNTU-CVE-2023-49286","UBUNTU-CVE-2023-50269"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6594-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-49285"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-49286"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-50269"}],"affected":[{"package":{"name":"squid","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/squid@4.10-1ubuntu1.9?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.10-1ubuntu1.9"}]}],"versions":["4.8-1ubuntu2","4.8-1ubuntu3","4.9-2ubuntu1","4.9-2ubuntu2","4.9-2ubuntu3","4.9-2ubuntu4","4.10-1ubuntu1","4.10-1ubuntu1.1","4.10-1ubuntu1.2","4.10-1ubuntu1.3","4.10-1ubuntu1.4","4.10-1ubuntu1.5","4.10-1ubuntu1.6","4.10-1ubuntu1.7","4.10-1ubuntu1.8"],"ecosystem_specific":{"binaries":[{"binary_name":"squid","binary_version":"4.10-1ubuntu1.9"},{"binary_name":"squid-cgi","binary_version":"4.10-1ubuntu1.9"},{"binary_name":"squid-common","binary_version":"4.10-1ubuntu1.9"},{"binary_name":"squid-purge","binary_version":"4.10-1ubuntu1.9"},{"binary_name":"squidclient","binary_version":"4.10-1ubuntu1.9"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2023-49285","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-49286","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-50269","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6594-1.json"}},{"package":{"name":"squid","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/squid@5.7-0ubuntu0.22.04.3?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.7-0ubuntu0.22.04.3"}]}],"versions":["4.13-10ubuntu5","5.2-1ubuntu1","5.2-1ubuntu3","5.2-1ubuntu4","5.2-1ubuntu4.1","5.2-1ubuntu4.2","5.2-1ubuntu4.3","5.7-0ubuntu0.22.04.1","5.7-0ubuntu0.22.04.2"],"ecosystem_specific":{"binaries":[{"binary_name":"squid","binary_version":"5.7-0ubuntu0.22.04.3"},{"binary_name":"squid-cgi","binary_version":"5.7-0ubuntu0.22.04.3"},{"binary_name":"squid-common","binary_version":"5.7-0ubuntu0.22.04.3"},{"binary_name":"squid-openssl","binary_version":"5.7-0ubuntu0.22.04.3"},{"binary_name":"squid-purge","binary_version":"5.7-0ubuntu0.22.04.3"},{"binary_name":"squidclient","binary_version":"5.7-0ubuntu0.22.04.3"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2023-49285","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-49286","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-50269","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6594-1.json"}}],"schema_version":"1.7.3"}