8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
0.006 Low
EPSS
Percentile
78.7%
A flaw was found in Squid. Due to an improper validation of the specified index bug, Squid compiled using --with-openssl
is vulnerable to a denial of service attack against SSL Certificate validation. This flaw allows a remote server to perform a denial of service against the Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump.
Disable the use of SSL-Bump features:
- Remove all ssl-bump options from http_port and https_port
- Remove all ssl_bump directives from squid.conf
www.squid-cache.org/Versions/v5/SQUID-2023_4.patch
www.squid-cache.org/Versions/v6/SQUID-2023_4.patch
bugzilla.redhat.com/show_bug.cgi?id=2247567
github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810
github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3
nvd.nist.gov/vuln/detail/CVE-2023-46724
www.cve.org/CVERecord?id=CVE-2023-46724