{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-33620","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-03T23:58:21.468Z","dateReserved":"2021-05-28T00:00:00.000Z","datePublished":"2021-05-28T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-10-17T04:06:14.805Z"},"descriptions":[{"lang":"en","value":"Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://github.com/squid-cache/squid/security/advisories/GHSA-572g-rvwr-6c7f"},{"url":"http://www.squid-cache.org/Versions/v5/changesets/squid-5-8af775ed98bfd610f9ce762fe177e01b2675588c.patch"},{"url":"http://www.squid-cache.org/Versions/v4/changesets/squid-4-1e05a85bd28c22c9ca5d3ac9f5e86d6269ec0a8c.patch"},{"name":"FEDORA-2021-c0bec55ec7","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/"},{"name":"FEDORA-2021-24af72ff2c","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/"},{"name":"[debian-lts-announce] 20210614 [SECURITY] [DLA 2685-1] squid3 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html"},{"name":"[oss-security] 20231011 Squid Caching Proxy Security Audit: 55 Vulnerabilities, 35 0days.","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/10/11/3"},{"name":"20231016 Squid Caching Proxy Security Audit: 55 Vulnerabilities, 35 0days.","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2023/Oct/14"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:L/S:U/UI:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T23:58:21.468Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/squid-cache/squid/security/advisories/GHSA-572g-rvwr-6c7f","tags":["x_transferred"]},{"url":"http://www.squid-cache.org/Versions/v5/changesets/squid-5-8af775ed98bfd610f9ce762fe177e01b2675588c.patch","tags":["x_transferred"]},{"url":"http://www.squid-cache.org/Versions/v4/changesets/squid-4-1e05a85bd28c22c9ca5d3ac9f5e86d6269ec0a8c.patch","tags":["x_transferred"]},{"name":"FEDORA-2021-c0bec55ec7","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/"},{"name":"FEDORA-2021-24af72ff2c","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/"},{"name":"[debian-lts-announce] 20210614 [SECURITY] [DLA 2685-1] squid3 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html"},{"name":"[oss-security] 20231011 Squid Caching Proxy Security Audit: 55 Vulnerabilities, 35 0days.","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/10/11/3"},{"name":"20231016 Squid Caching Proxy Security Audit: 55 Vulnerabilities, 35 0days.","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2023/Oct/14"}]}]}}