CVE-2023-46724

NameCVE-2023-46724
DescriptionSquid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-5637-1
Debian Bugs1055252

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid (PTS)buster4.6-1+deb10u7fixed
buster (security)4.6-1+deb10u10fixed
bullseye4.13-10+deb11u2vulnerable
bullseye (security)4.13-10+deb11u3fixed
bookworm5.7-2vulnerable
bookworm (security)5.7-2+deb12u1fixed
trixie6.6-1fixed
sid6.9-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squidsourcebuster(not affected)
squidsourcebullseye4.13-10+deb11u3DSA-5637-1
squidsourcebookworm5.7-2+deb12u1DSA-5637-1
squidsource(unstable)6.5-11055252

Notes

[buster] - squid <not-affected> (Doesn't build with OpenSSL yet)
https://github.com/squid-cache/squid/commit/792ef23e6e1c05780fe17f733859eef6eb8c8be3
https://megamansec.github.io/Squid-Security-Audit/ssl-bufferunderread.html
https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3

Search for package or bug name: Reporting problems