Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-5824
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Squid: dos against http and https
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对异常条件的处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Squid 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Squid是一套代理服务器和Web缓存服务器软件。该软件提供缓存万维网、过滤流量、代理上网等功能。 Squid 6.4之前版本存在安全漏洞,该漏洞源于结构元素错误处理不当,容易受到针对HTTP和HTTPS客户端的拒绝服务攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Red HatRed Hat Enterprise Linux 8 8090020231130092412.a75119d5 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8.2 Advanced Update Support 8020020240122164331.4cda2c84 ~ * cpe:/a:redhat:rhel_tus:8.2::appstream
Red HatRed Hat Enterprise Linux 8.2 Telecommunications Update Service 8020020240122164331.4cda2c84 ~ * cpe:/a:redhat:rhel_tus:8.2::appstream
Red HatRed Hat Enterprise Linux 8.2 Update Services for SAP Solutions 8020020240122164331.4cda2c84 ~ * cpe:/a:redhat:rhel_tus:8.2::appstream
Red HatRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 8040020240122165847.522a0ee4 ~ * cpe:/a:redhat:rhel_e4s:8.4::appstream
Red HatRed Hat Enterprise Linux 8.4 Telecommunications Update Service 8040020240122165847.522a0ee4 ~ * cpe:/a:redhat:rhel_e4s:8.4::appstream
Red HatRed Hat Enterprise Linux 8.4 Update Services for SAP Solutions 8040020240122165847.522a0ee4 ~ * cpe:/a:redhat:rhel_e4s:8.4::appstream
Red HatRed Hat Enterprise Linux 8.6 Extended Update Support 8060020231222131040.ad008a3a ~ * cpe:/a:redhat:rhel_eus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.8 Extended Update Support 8080020231222130009.63b34585 ~ * cpe:/a:redhat:rhel_eus:8.8::appstream
Red HatRed Hat Enterprise Linux 9 7:5.5-6.el9_3.2 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9.0 Extended Update Support 7:5.2-1.el9_0.4 ~ * cpe:/a:redhat:rhel_eus:9.0::appstream
Red HatRed Hat Enterprise Linux 9.2 Extended Update Support 7:5.5-5.el9_2.3 ~ * cpe:/a:redhat:rhel_eus:9.2::appstream
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
II. Public POCs for CVE-2023-5824
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-5824
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-5824

No comments yet


Leave a comment