Bug 1216498 (CVE-2023-46848) - VUL-0: CVE-2023-46848: squid: Denial of Service in FTP (SQUID-2023:5)
Summary: VUL-0: CVE-2023-46848: squid: Denial of Service in FTP (SQUID-2023:5)
Status: RESOLVED FIXED
Alias: CVE-2023-46848
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/382743/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-46848:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-10-23 12:01 UTC by Alexander Bergmann
Modified: 2024-05-03 18:07 UTC (History)
4 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2023-10-23 12:01:14 UTC
https://github.com/squid-cache/squid/security/advisories/GHSA-2g3c-pg7q-g59w

Package: squid
Affected versions: 5.0.3-5.9, 6.0-6.3
Patched versions: 6.4

Description:
Due to an Incorrect Conversion between Numeric Types bug Squid is vulnerable to a Denial of Service attack against FTP Native Relay input validation.

Due to an Incorrect Conversion between Numeric Types bug Squid is vulnerable to a Denial of Service attack against ftp:// URL validation and access control.

Severity:
This problem allows a remote client to perform Denial of Service when sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.

This issue is triggered during access control security checks, meaning clients may not have been permitted to use the proxy yet.

FTP support is always enabled and cannot be disabled completely.

CVSS Score of 8.6
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H&version=3.1

Updated Packages:
This bug is fixed by Squid version 6.4.

In addition, patches addressing this problem for the stable
releases can be found in our patch archives:

Squid 5:
http://www.squid-cache.org/Versions/v5/SQUID-2023_5.patch

Squid 6:
http://www.squid-cache.org/Versions/v6/SQUID-2023_5.patch

If you are using a prepackaged version of Squid then please refer
to the package vendor for availability information on updated
packages.

Determining if your version is vulnerable:
Squid older than 5.0.3 are not vulnerable.
All Squid-5.0.4 up to and including 5.6 are vulnerable.
All Squid-6.x up to and including 6.3 are vulnerable.

Workaround:
The FTP Native Relay input validation vector can be secured by removing all ftp_port directives from squid.conf.

There are no workarounds to avoid the ftp:// URL validation and access control vector.
Comment 1 Thomas Leroy 2023-10-24 14:35:21 UTC
Only SUSE:SLE-15-SP4:Update is affected.
Comment 3 Alexander Bergmann 2023-10-27 13:55:37 UTC
CVE-2023-46848 was assigned to this issue.
Comment 5 OBSbugzilla Bot 2023-11-02 11:15:04 UTC
This is an autogenerated message for OBS integration:
This bug (1216498) was mentioned in
https://build.opensuse.org/request/show/1122203 Factory / squid
Comment 7 Maintenance Automation 2023-11-06 16:30:07 UTC
SUSE-SU-2023:4381-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1216495, 1216498, 1216500, 1216803
CVE References: CVE-2023-46724, CVE-2023-46846, CVE-2023-46847, CVE-2023-46848
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): squid-4.17-4.30.1
SUSE Linux Enterprise Server 12 SP5 (src): squid-4.17-4.30.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): squid-4.17-4.30.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-11-06 16:30:11 UTC
SUSE-SU-2023:4380-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1216495, 1216498, 1216500, 1216803
CVE References: CVE-2023-46724, CVE-2023-46846, CVE-2023-46847, CVE-2023-46848
Sources used:
openSUSE Leap 15.4 (src): squid-5.7-150400.3.12.1
openSUSE Leap 15.5 (src): squid-5.7-150400.3.12.1
Server Applications Module 15-SP4 (src): squid-5.7-150400.3.12.1
Server Applications Module 15-SP5 (src): squid-5.7-150400.3.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Maintenance Automation 2023-11-08 12:30:02 UTC
SUSE-SU-2023:4384-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1216495, 1216498, 1216500, 1216803
CVE References: CVE-2023-46724, CVE-2023-46846, CVE-2023-46847, CVE-2023-46848
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): squid-4.17-150000.5.38.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): squid-4.17-150000.5.38.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): squid-4.17-150000.5.38.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): squid-4.17-150000.5.38.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): squid-4.17-150000.5.38.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): squid-4.17-150000.5.38.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): squid-4.17-150000.5.38.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): squid-4.17-150000.5.38.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): squid-4.17-150000.5.38.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): squid-4.17-150000.5.38.1
SUSE Enterprise Storage 7.1 (src): squid-4.17-150000.5.38.1
SUSE CaaS Platform 4.0 (src): squid-4.17-150000.5.38.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.