vuln-list-alt/oval/c10f1/ALT-PU-2023-7461/definitions.json
2024-10-31 16:59:21 +00:00

216 lines
10 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20237461",
"Version": "oval:org.altlinux.errata:def:20237461",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-7461: package `squid` update to version 6.5-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-7461",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-7461",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-07699",
"RefURL": "https://bdu.fstec.ru/vul/2023-07699",
"Source": "BDU"
},
{
"RefID": "BDU:2023-07920",
"RefURL": "https://bdu.fstec.ru/vul/2023-07920",
"Source": "BDU"
},
{
"RefID": "BDU:2023-08061",
"RefURL": "https://bdu.fstec.ru/vul/2023-08061",
"Source": "BDU"
},
{
"RefID": "BDU:2023-08062",
"RefURL": "https://bdu.fstec.ru/vul/2023-08062",
"Source": "BDU"
},
{
"RefID": "BDU:2023-08063",
"RefURL": "https://bdu.fstec.ru/vul/2023-08063",
"Source": "BDU"
},
{
"RefID": "CVE-2023-46724",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-46724",
"Source": "CVE"
},
{
"RefID": "CVE-2023-46846",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-46846",
"Source": "CVE"
},
{
"RefID": "CVE-2023-46847",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-46847",
"Source": "CVE"
},
{
"RefID": "CVE-2023-46848",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-46848",
"Source": "CVE"
},
{
"RefID": "CVE-2023-5824",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5824",
"Source": "CVE"
}
],
"Description": "This update upgrades squid to version 6.5-alt1. \nSecurity Fix(es):\n\n * BDU:2023-07699: Уязвимость прокси-сервера Squid, связанная с ошибками при проверке сертификата SSL/TLS, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-07920: Уязвимость обработчика аутентификации HTTP Digest Authentication прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие\n\n * BDU:2023-08061: Уязвимость прокси-сервера Squid, связана с неправильным обращением с исключительными условиями и неконтролируемым потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-08062: Уязвимость прокси-сервера Squid, связана с неправильным преобразованием между числовыми типами и неконтролируемым потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-08063: Уязвимость декодера chunked прокси-сервера Squid, \nпозволяющая нарушителю взаимодействовать с сервером напрямую\n\n * CVE-2023-46724: Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.\n\n * CVE-2023-46846: SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.\n\n * CVE-2023-46847: Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.\n\n * CVE-2023-46848: Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.\n\n * CVE-2023-5824: A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-12-01"
},
"Updated": {
"Date": "2023-12-01"
},
"BDUs": [
{
"ID": "BDU:2023-07699",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-125, CWE-129, CWE-295, CWE-786, CWE-823, CWE-1285",
"Href": "https://bdu.fstec.ru/vul/2023-07699",
"Impact": "High",
"Public": "20231101"
},
{
"ID": "BDU:2023-07920",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2023-07920",
"Impact": "Critical",
"Public": "20231103"
},
{
"ID": "BDU:2023-08061",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-755",
"Href": "https://bdu.fstec.ru/vul/2023-08061",
"Impact": "High",
"Public": "20231103"
},
{
"ID": "BDU:2023-08062",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-681",
"Href": "https://bdu.fstec.ru/vul/2023-08062",
"Impact": "High",
"Public": "20231103"
},
{
"ID": "BDU:2023-08063",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-444",
"Href": "https://bdu.fstec.ru/vul/2023-08063",
"Impact": "Low",
"Public": "20231103"
}
],
"CVEs": [
{
"ID": "CVE-2023-46724",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-295",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-46724",
"Impact": "High",
"Public": "20231101"
},
{
"ID": "CVE-2023-46846",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-444",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-46846",
"Impact": "Low",
"Public": "20231103"
},
{
"ID": "CVE-2023-46847",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-46847",
"Impact": "High",
"Public": "20231103"
},
{
"ID": "CVE-2023-46848",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-681",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-46848",
"Impact": "High",
"Public": "20231103"
},
{
"ID": "CVE-2023-5824",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-755",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5824",
"Impact": "High",
"Public": "20231103"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20237461001",
"Comment": "squid is earlier than 0:6.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20237461002",
"Comment": "squid-doc is earlier than 0:6.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20237461003",
"Comment": "squid-helpers is earlier than 0:6.5-alt1"
}
]
}
]
}
}
]
}