ALAS-2023-2354

Related Vulnerabilities: CVE-2023-46724   CVE-2023-46728  

Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages. (CVE-2023-46724) Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests. (CVE-2023-46728)

ALAS-2023-2354


Amazon Linux 2 Security Advisory: ALAS-2023-2354
Advisory Release Date: 2023-11-29 22:19 Pacific
Advisory Updated Date: 2023-12-04 21:44 Pacific
Severity: Important

Issue Overview:

Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages. (CVE-2023-46724)

Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests. (CVE-2023-46728)


Affected Packages:

squid


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update squid to update your system.

New Packages:
aarch64:
    squid-3.5.20-17.amzn2.7.14.aarch64
    squid-sysvinit-3.5.20-17.amzn2.7.14.aarch64
    squid-migration-script-3.5.20-17.amzn2.7.14.aarch64
    squid-debuginfo-3.5.20-17.amzn2.7.14.aarch64

i686:
    squid-3.5.20-17.amzn2.7.14.i686
    squid-sysvinit-3.5.20-17.amzn2.7.14.i686
    squid-migration-script-3.5.20-17.amzn2.7.14.i686
    squid-debuginfo-3.5.20-17.amzn2.7.14.i686

src:
    squid-3.5.20-17.amzn2.7.14.src

x86_64:
    squid-3.5.20-17.amzn2.7.14.x86_64
    squid-sysvinit-3.5.20-17.amzn2.7.14.x86_64
    squid-migration-script-3.5.20-17.amzn2.7.14.x86_64
    squid-debuginfo-3.5.20-17.amzn2.7.14.x86_64