8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
0.006 Low
EPSS
Percentile
78.7%
Squid is a caching proxy for the Web. Due to an Improper Validation of
Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to
6.4 compiled using --with-openssl
are vulnerable to a Denial of Service
attack against SSL Certificate validation. This problem allows a remote
server to perform Denial of Service against Squid Proxy by initiating a TLS
Handshake with a specially crafted SSL Certificate in a server certificate
chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in
Squid version 6.4. In addition, patches addressing this problem for the
stable releases can be found in Squid’s patch archives. Those who you use a
prepackaged version of Squid should refer to the package vendor for
availability information on updated packages.
Author | Note |
---|---|
mdeslaur | only affects builds with openssl, which is not enabled in focal and earlier |
github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3
launchpad.net/bugs/cve/CVE-2023-46724
megamansec.github.io/Squid-Security-Audit/ssl-bufferunderread.html
nvd.nist.gov/vuln/detail/CVE-2023-46724
security-tracker.debian.org/tracker/CVE-2023-46724
ubuntu.com/security/notices/USN-6500-1
www.cve.org/CVERecord?id=CVE-2023-46724