{"id":"USN-6500-1","summary":"squid vulnerabilities","details":"Joshua Rogers discovered that Squid incorrectly handled validating certain\nSSL certificates. A remote attacker could possibly use this issue to cause\nSquid to crash, resulting in a denial of service. This issue only affected\nUbuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-46724)\n\nJoshua Rogers discovered that Squid incorrectly handled the Gopher\nprotocol. A remote attacker could possibly use this issue to cause Squid to\ncrash, resulting in a denial of service. Gopher support has been disabled\nin this update. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04\nLTS, and Ubuntu 23.04. (CVE-2023-46728)\n\nKeran Mu and Jianjun Chen discovered that Squid incorrectly handled the\nchunked decoder. A remote attacker could possibly use this issue to perform\nHTTP request smuggling attacks. (CVE-2023-46846)\n\nJoshua Rogers discovered that Squid incorrectly handled HTTP Digest\nAuthentication. A remote attacker could possibly use this issue to cause\nSquid to crash, resulting in a denial of service. (CVE-2023-46847)\n\nJoshua Rogers discovered that Squid incorrectly handled certain FTP urls.\nA remote attacker could possibly use this issue to cause Squid to crash,\nresulting in a denial of service. (CVE-2023-46848)\n","modified":"2026-02-10T04:43:26Z","published":"2023-11-21T15:42:49Z","related":["UBUNTU-CVE-2023-46724","UBUNTU-CVE-2023-46728","UBUNTU-CVE-2023-46846","UBUNTU-CVE-2023-46847","UBUNTU-CVE-2023-46848"],"upstream":["CVE-2023-46724","CVE-2023-46728","CVE-2023-46846","CVE-2023-46847","CVE-2023-46848","UBUNTU-CVE-2023-46724","UBUNTU-CVE-2023-46728","UBUNTU-CVE-2023-46846","UBUNTU-CVE-2023-46847","UBUNTU-CVE-2023-46848"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6500-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-46724"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-46728"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-46846"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-46847"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-46848"}],"affected":[{"package":{"name":"squid","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/squid@4.10-1ubuntu1.8?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.10-1ubuntu1.8"}]}],"versions":["4.8-1ubuntu2","4.8-1ubuntu3","4.9-2ubuntu1","4.9-2ubuntu2","4.9-2ubuntu3","4.9-2ubuntu4","4.10-1ubuntu1","4.10-1ubuntu1.1","4.10-1ubuntu1.2","4.10-1ubuntu1.3","4.10-1ubuntu1.4","4.10-1ubuntu1.5","4.10-1ubuntu1.6","4.10-1ubuntu1.7"],"ecosystem_specific":{"binaries":[{"binary_version":"4.10-1ubuntu1.8","binary_name":"squid"},{"binary_version":"4.10-1ubuntu1.8","binary_name":"squid-cgi"},{"binary_version":"4.10-1ubuntu1.8","binary_name":"squid-common"},{"binary_version":"4.10-1ubuntu1.8","binary_name":"squid-purge"},{"binary_version":"4.10-1ubuntu1.8","binary_name":"squidclient"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6500-1.json","cves_map":{"cves":[{"id":"CVE-2023-46728","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-46846","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-46847","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"squid","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/squid@5.7-0ubuntu0.22.04.2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.7-0ubuntu0.22.04.2"}]}],"versions":["4.13-10ubuntu5","5.2-1ubuntu1","5.2-1ubuntu3","5.2-1ubuntu4","5.2-1ubuntu4.1","5.2-1ubuntu4.2","5.2-1ubuntu4.3","5.7-0ubuntu0.22.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.7-0ubuntu0.22.04.2","binary_name":"squid"},{"binary_version":"5.7-0ubuntu0.22.04.2","binary_name":"squid-cgi"},{"binary_version":"5.7-0ubuntu0.22.04.2","binary_name":"squid-common"},{"binary_version":"5.7-0ubuntu0.22.04.2","binary_name":"squid-openssl"},{"binary_version":"5.7-0ubuntu0.22.04.2","binary_name":"squid-purge"},{"binary_version":"5.7-0ubuntu0.22.04.2","binary_name":"squidclient"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6500-1.json","cves_map":{"cves":[{"id":"CVE-2023-46724","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-46728","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-46846","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-46847","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-46848","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.3"}