A flaw was found in Squid through version 4.7. When handling the tag esi:when, when ESI is enabled, Squid calls the ESIExpression::Evaluate function which uses a fixed stack buffer to hold the expression. While processing the expression, there is no check to ensure that the stack won't overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | squid | 2020-06-23 06:08 | ALAS-2020-1386 |
Amazon Linux 1 | squid | 2020-06-01 12:25 | ALAS-2020-1378 |
Amazon Linux 2 - Core | squid | 2020-06-26 22:56 | ALAS2-2020-1448 |
Amazon Linux 2 - Squid4 Extra | squid | 2023-08-21 20:59 | ALAS2SQUID4-2023-008 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 8.1 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
NVD | CVSSv2 | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
NVD | CVSSv3 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |