SB2023110758 - Red Hat Enterprise Linux 9 update for squid 



SB2023110758 - Red Hat Enterprise Linux 9 update for squid

Published: November 7, 2023

Security Bulletin ID SB2023110758
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2023-46846)

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests when parsing HTTP/1.1 and ICAP messages. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.


2) Buffer overflow (CVE-ID: CVE-2023-46847)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in HTTP Digest Authentication. A remote attacker can trigger memory corruption and cause a denial of service condition on the target system.


3) Improper Handling of Structural Elements (CVE-ID: CVE-2023-5824)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of structural elements in HTTP response caching. A remote user can cause a denial of service condition on the target system.


Remediation

Install update from vendor's website.