SB2024021235 - Red Hat Enterprise Linux 8 update for the squid:4 module 



SB2024021235 - Red Hat Enterprise Linux 8 update for the squid:4 module

Published: February 12, 2024

Security Bulletin ID SB2024021235
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Improper Handling of Structural Elements (CVE-ID: CVE-2023-5824)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of structural elements in HTTP response caching. A remote user can cause a denial of service condition on the target system.


2) Improper Certificate Validation (CVE-ID: CVE-2023-46724)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation when processing a specially crafted SSL Certificate in a server certificate chain. A remote attacker can initiate a TLS Handshake with a specially crafted SSL certificate and perform a denial of service (DoS) attack.


3) NULL pointer dereference (CVE-ID: CVE-2023-46728)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in Gopher gateway. A remote attacker can pass specially crafted data to the server and perform a denial of service (DoS) attack.


4) Out-of-bounds read (CVE-ID: CVE-2023-49285)

The vulnerability allows a remote attacker perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition when handling HTTP messages. A remote attacker can send specially crafted data to the server, trigger an out-of-bounds read error and crash the proxy server.


5) Unchecked Return Value (CVE-ID: CVE-2023-49286)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect check of function return value in Helper process management. A remote attacker can pass specially crafted data to the proxy server and perform a denial of service (DoS) attack.


6) Uncontrolled Recursion (CVE-ID: CVE-2023-50269)

The vulnerability allows a remote client to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrolled recursion when parsing HTTP requests. A remote client can send a specially crafted HTTP request with the a large X-Forwarded-For header, when the follow_x_forwarded_for feature is configured, and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.