QID 356755
Date Published: 2023-12-06
QID 356755: Amazon Linux Security Advisory for squid : ALAS2-2023-2354
Squid is a caching proxy for the web.
Due to an improper validation of specified index bug, squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a denial of service attack against ssl certificate validation.
This problem allows a remote server to perform denial of service against squid proxy by initiating a tls handshake with a specially crafted ssl certificate in a server certificate chain.
This attack is limited to https and ssl-bump.
This bug is fixed in squid version 6.4.
In addition, patches addressing this problem for the stable releases can be found in squid's patch archives.
Those who you use a prepackaged version of squid should refer to the package vendor for availability information on updated packages. (
( CVE-2023-46724) squid is a caching proxy for the web supporting http, https, ftp, and more.
Due to a null pointer dereference bug squid is vulnerable to a denial of service attack against squid's gopher gateway.
The gopher protocol is always available and enabled in squid prior to squid 6.0.1.
Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent.
Gopher support has been removed in squid version 6.0.1.
Users are advised to upgrade.
Users unable to upgrade should reject all gopher url requests. (
( CVE-2023-46728)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2-2023-2354 -
alas.aws.amazon.com/AL2/ALAS-2023-2354.html
CVEs related to QID 356755
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2-2023-2354 | amazon linux 2 |
|