CVE-2023-46847
Detail




Description

Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.

Metrics







NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.

CVSS 4.0 Severity and Vector Strings:

References to Advisories, Solutions, and Tools


By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected].









































































































































URL Source(s) Tag(s)

https://access.redhat.com/errata/RHSA-2023:6266
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:6267
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:6268
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:6748
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:6801
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:6803
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:6804
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:6805
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:6810
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:6882
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:6884
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:7213
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:7576
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/errata/RHSA-2023:7578
CVE, Inc., Red Hat

Third Party Advisory 

https://access.redhat.com/security/cve/CVE-2023-46847
CVE, Inc., Red Hat

Third Party Advisory 

https://bugzilla.redhat.com/show_bug.cgi?id=2245916
CVE, Inc., Red Hat

Issue Tracking 

Third Party Advisory 

https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g
CVE, Inc., Red Hat

Vendor Advisory 

https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html
CVE

https://security.netapp.com/advisory/ntap-20231130-0002/
CVE

Weakness Enumeration









CWE-ID CWE Name Source

CWE-120
Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)

cwe source acceptance level

NIST  








Red Hat, Inc.  

Change History

15 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-46847
NVD
Published Date:

11/03/2023
NVD
Last Modified:

11/21/2024

Source:

Red Hat, Inc.




Source link

#

Comments are closed