{"id":"CVE-2023-46724","summary":"SQUID-2023:4 Denial of Service in SSL Certificate validation","details":"Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.","aliases":["GHSA-73m6-jm96-c6r3"],"modified":"2026-04-02T09:29:20.881871Z","published":"2023-11-01T19:09:34.513Z","related":["ALSA-2024:0046","ALSA-2024:0071","MGASA-2024-0102","SUSE-SU-2023:4380-1","SUSE-SU-2023:4381-1","SUSE-SU-2023:4384-1","openSUSE-SU-2024:13398-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/46xxx/CVE-2023-46724.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-125","CWE-1285","CWE-129","CWE-786","CWE-823"]},"references":[{"type":"WEB","url":"http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch"},{"type":"WEB","url":"http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/46xxx/CVE-2023-46724.json"},{"type":"ADVISORY","url":"https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46724"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20231208-0001/"},{"type":"FIX","url":"https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/squid-cache/squid","events":[{"introduced":"b6bc3157c337458cd6615fd2120fa5446f82d1c3"},{"fixed":"1d8175b27fc1c347649d4f221ff2633e8d800429"}]}],"versions":["SQUID_3_3_0_1","SQUID_3_3_0_2","SQUID_3_3_0_3","SQUID_3_3_1","SQUID_3_3_10","SQUID_3_3_11","SQUID_3_3_12","SQUID_3_3_13","SQUID_3_3_14","SQUID_3_3_2","SQUID_3_3_3","SQUID_3_3_4","SQUID_3_3_5","SQUID_3_3_6","SQUID_3_3_7","SQUID_3_3_8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46724.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}]}