Bug 2247567 (CVE-2023-46724) - CVE-2023-46724 squid: Denial of Service in SSL Certificate validation
Summary: CVE-2023-46724 squid: Denial of Service in SSL Certificate validation
Keywords:
Status: NEW
Alias: CVE-2023-46724
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2250224
Blocks: 2247568
TreeView+ depends on / blocked
 
Reported: 2023-11-02 03:35 UTC by Avinash Hanwate
Modified: 2024-04-11 16:43 UTC (History)
0 users

Fixed In Version: squid 6.4
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Squid. Due to an improper validation of the specified index bug, Squid compiled using `--with-openssl` is vulnerable to a denial of service attack against SSL Certificate validation. This flaw allows a remote server to perform a denial of service against the Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:0080 0 None None None 2024-01-08 14:25:46 UTC
Red Hat Product Errata RHSA-2024:0046 0 None None None 2024-01-03 21:05:59 UTC
Red Hat Product Errata RHSA-2024:0071 0 None None None 2024-01-08 08:19:39 UTC
Red Hat Product Errata RHSA-2024:0072 0 None None None 2024-01-08 08:19:10 UTC
Red Hat Product Errata RHSA-2024:0397 0 None None None 2024-01-24 12:22:31 UTC
Red Hat Product Errata RHSA-2024:0771 0 None None None 2024-02-12 08:39:05 UTC
Red Hat Product Errata RHSA-2024:0772 0 None None None 2024-02-12 08:35:37 UTC
Red Hat Product Errata RHSA-2024:0773 0 None None None 2024-02-12 08:37:22 UTC
Red Hat Product Errata RHSA-2024:1153 0 None None None 2024-03-05 18:00:49 UTC
Red Hat Product Errata RHSA-2024:1787 0 None None None 2024-04-11 16:43:05 UTC

Description Avinash Hanwate 2023-11-02 03:35:13 UTC
 Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.

https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3
http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch
http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch
https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810

Comment 2 Sandipan Roy 2023-11-17 06:45:27 UTC
Created squid tracking bugs for this issue:

Affects: fedora-all [bug 2250224]

Comment 6 errata-xmlrpc 2024-01-03 21:05:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:0046 https://access.redhat.com/errata/RHSA-2024:0046

Comment 7 errata-xmlrpc 2024-01-08 08:19:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:0072 https://access.redhat.com/errata/RHSA-2024:0072

Comment 8 errata-xmlrpc 2024-01-08 08:19:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:0071 https://access.redhat.com/errata/RHSA-2024:0071

Comment 9 errata-xmlrpc 2024-01-24 12:22:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:0397 https://access.redhat.com/errata/RHSA-2024:0397

Comment 10 errata-xmlrpc 2024-02-12 08:35:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2024:0772 https://access.redhat.com/errata/RHSA-2024:0772

Comment 11 errata-xmlrpc 2024-02-12 08:37:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:0773 https://access.redhat.com/errata/RHSA-2024:0773

Comment 12 errata-xmlrpc 2024-02-12 08:39:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0771 https://access.redhat.com/errata/RHSA-2024:0771

Comment 13 errata-xmlrpc 2024-03-05 18:00:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:1153 https://access.redhat.com/errata/RHSA-2024:1153

Comment 16 errata-xmlrpc 2024-04-11 16:43:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2024:1787 https://access.redhat.com/errata/RHSA-2024:1787


Note You need to log in before you can comment on or make changes to this bug.