Bugzilla – Bug 1216498
VUL-0: CVE-2023-46848: squid: Denial of Service in FTP (SQUID-2023:5)
Last modified: 2024-05-03 18:07:57 UTC
https://github.com/squid-cache/squid/security/advisories/GHSA-2g3c-pg7q-g59w Package: squid Affected versions: 5.0.3-5.9, 6.0-6.3 Patched versions: 6.4 Description: Due to an Incorrect Conversion between Numeric Types bug Squid is vulnerable to a Denial of Service attack against FTP Native Relay input validation. Due to an Incorrect Conversion between Numeric Types bug Squid is vulnerable to a Denial of Service attack against ftp:// URL validation and access control. Severity: This problem allows a remote client to perform Denial of Service when sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input. This issue is triggered during access control security checks, meaning clients may not have been permitted to use the proxy yet. FTP support is always enabled and cannot be disabled completely. CVSS Score of 8.6 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H&version=3.1 Updated Packages: This bug is fixed by Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in our patch archives: Squid 5: http://www.squid-cache.org/Versions/v5/SQUID-2023_5.patch Squid 6: http://www.squid-cache.org/Versions/v6/SQUID-2023_5.patch If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. Determining if your version is vulnerable: Squid older than 5.0.3 are not vulnerable. All Squid-5.0.4 up to and including 5.6 are vulnerable. All Squid-6.x up to and including 6.3 are vulnerable. Workaround: The FTP Native Relay input validation vector can be secured by removing all ftp_port directives from squid.conf. There are no workarounds to avoid the ftp:// URL validation and access control vector.
Only SUSE:SLE-15-SP4:Update is affected.
CVE-2023-46848 was assigned to this issue.
This is an autogenerated message for OBS integration: This bug (1216498) was mentioned in https://build.opensuse.org/request/show/1122203 Factory / squid
SUSE-SU-2023:4381-1: An update that solves four vulnerabilities can now be installed. Category: security (important) Bug References: 1216495, 1216498, 1216500, 1216803 CVE References: CVE-2023-46724, CVE-2023-46846, CVE-2023-46847, CVE-2023-46848 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): squid-4.17-4.30.1 SUSE Linux Enterprise Server 12 SP5 (src): squid-4.17-4.30.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): squid-4.17-4.30.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4380-1: An update that solves four vulnerabilities can now be installed. Category: security (important) Bug References: 1216495, 1216498, 1216500, 1216803 CVE References: CVE-2023-46724, CVE-2023-46846, CVE-2023-46847, CVE-2023-46848 Sources used: openSUSE Leap 15.4 (src): squid-5.7-150400.3.12.1 openSUSE Leap 15.5 (src): squid-5.7-150400.3.12.1 Server Applications Module 15-SP4 (src): squid-5.7-150400.3.12.1 Server Applications Module 15-SP5 (src): squid-5.7-150400.3.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4384-1: An update that solves four vulnerabilities can now be installed. Category: security (important) Bug References: 1216495, 1216498, 1216500, 1216803 CVE References: CVE-2023-46724, CVE-2023-46846, CVE-2023-46847, CVE-2023-46848 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): squid-4.17-150000.5.38.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): squid-4.17-150000.5.38.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): squid-4.17-150000.5.38.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): squid-4.17-150000.5.38.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): squid-4.17-150000.5.38.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): squid-4.17-150000.5.38.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): squid-4.17-150000.5.38.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): squid-4.17-150000.5.38.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): squid-4.17-150000.5.38.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): squid-4.17-150000.5.38.1 SUSE Enterprise Storage 7.1 (src): squid-4.17-150000.5.38.1 SUSE CaaS Platform 4.0 (src): squid-4.17-150000.5.38.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.