SB2023102416 - Multiple vulnerabilities in Squid
Published: October 24, 2023 Updated: August 1, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2023-46847)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in HTTP Digest Authentication. A remote attacker can trigger memory corruption and cause a denial of service condition on the target system.
2) Improper Handling of Structural Elements (CVE-ID: CVE-2023-5824)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper handling of structural elements in HTTP response caching. A remote user can cause a denial of service condition on the target system.
3) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2023-46846)
The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.
The vulnerability exists due to improper validation of HTTP requests when parsing HTTP/1.1 and ICAP messages. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.
Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.
4) Input validation error (CVE-ID: CVE-2023-46848)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send ftp:// URLs in HTTP Request messages or construct ftp:// URLs from FTP Native input and crash the proxy server.
5) Improper Certificate Validation (CVE-ID: CVE-2023-46724)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation when processing a specially crafted SSL Certificate in a server certificate chain. A remote attacker can initiate a TLS Handshake with a specially crafted SSL certificate and perform a denial of service (DoS) attack.
6) Buffer Over-read (CVE-ID: CVE-2025-54574)
The vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to a boundary error when processing URN Trivial-HTTP responses. A remote user can send a specially crafted HTTP response from the web server to the affected proxy, trigger memory corruption and force the proxy to deliver up to 4KB of Squid allocated heap memory to the client.
Remediation
Install update from vendor's website.
References
- https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g
- https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255
- https://github.com/squid-cache/squid/security/advisories/GHSA-j83v-w3p4-5cqh
- https://github.com/squid-cache/squid/security/advisories/GHSA-2g3c-pg7q-g59w
- https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3
- http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch
- http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch
- https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810
- https://github.com/squid-cache/squid/security/advisories/GHSA-w4gv-vw3f-29g3