We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | GitHub_M |
Reserved | 2023-10-25 |
Published | 2023-11-01 |
Updated | 2024-09-05 |
Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
CWE-129: Improper Validation of Array Index
CWE-786: Access of Memory Location Before Start of Buffer
CWE-823: Use of Out-of-range Pointer Offset
CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input
https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3
https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810
http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch
http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch
https://security.netapp.com/advisory/ntap-20231208-0001/