Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2023.6500.2
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6500-2)
Summary:The remote host is missing an update for the 'squid3' package(s) announced via the USN-6500-2 advisory.
Description:Summary:
The remote host is missing an update for the 'squid3' package(s) announced via the USN-6500-2 advisory.

Vulnerability Insight:
USN-6500-1 fixed several vulnerabilities in Squid. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

Joshua Rogers discovered that Squid incorrectly handled the Gopher
protocol. A remote attacker could possibly use this issue to cause Squid to
crash, resulting in a denial of service. Gopher support has been disabled
in this update. (CVE-2023-46728)

Joshua Rogers discovered that Squid incorrectly handled HTTP Digest
Authentication. A remote attacker could possibly use this issue to cause
Squid to crash, resulting in a denial of service. (CVE-2023-46847)

Affected Software/OS:
'squid3' package(s) on Ubuntu 16.04, Ubuntu 18.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-46728
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/
https://github.com/squid-cache/squid/commit/6ea12e8fb590ac6959e9356a81aa3370576568c3
https://github.com/squid-cache/squid/security/advisories/GHSA-cg5h-v6vc-w33f
Common Vulnerability Exposure (CVE) ID: CVE-2023-46847
RHBZ#2245916
https://bugzilla.redhat.com/show_bug.cgi?id=2245916
RHSA-2023:6266
https://access.redhat.com/errata/RHSA-2023:6266
RHSA-2023:6267
https://access.redhat.com/errata/RHSA-2023:6267
RHSA-2023:6268
https://access.redhat.com/errata/RHSA-2023:6268
RHSA-2023:6748
https://access.redhat.com/errata/RHSA-2023:6748
RHSA-2023:6801
https://access.redhat.com/errata/RHSA-2023:6801
RHSA-2023:6803
https://access.redhat.com/errata/RHSA-2023:6803
RHSA-2023:6804
https://access.redhat.com/errata/RHSA-2023:6804
RHSA-2023:6805
https://access.redhat.com/errata/RHSA-2023:6805
RHSA-2023:6810
https://access.redhat.com/errata/RHSA-2023:6810
RHSA-2023:6882
https://access.redhat.com/errata/RHSA-2023:6882
RHSA-2023:6884
https://access.redhat.com/errata/RHSA-2023:6884
RHSA-2023:7213
https://access.redhat.com/errata/RHSA-2023:7213
RHSA-2023:7576
https://access.redhat.com/errata/RHSA-2023:7576
RHSA-2023:7578
https://access.redhat.com/errata/RHSA-2023:7578
https://access.redhat.com/security/cve/CVE-2023-46847
https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g
https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html
https://security.netapp.com/advisory/ntap-20231130-0002/
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.