CVE Vulnerabilities

CVE-2023-46728

NULL Pointer Dereference

Published: Nov 06, 2023 | Modified: Nov 03, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squids Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
SquidSquid-cache*6.0.1 (excluding)
Red Hat Enterprise Linux 7RedHatsquid-7:3.5.20-17.el7_9.10*
Red Hat Enterprise Linux 8RedHatsquid:4-8090020231207155957.a75119d5*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatsquid:4-8020020240122164331.4cda2c84*
Red Hat Enterprise Linux 8.2 Telecommunications Update ServiceRedHatsquid:4-8020020240122164331.4cda2c84*
Red Hat Enterprise Linux 8.2 Update Services for SAP SolutionsRedHatsquid:4-8020020240122164331.4cda2c84*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatsquid:4-8040020240122165847.522a0ee4*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatsquid:4-8040020240122165847.522a0ee4*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatsquid:4-8040020240122165847.522a0ee4*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatsquid:4-8060020231222131040.ad008a3a*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatsquid:4-8080020231222130009.63b34585*
Red Hat Enterprise Linux 9RedHatsquid-7:5.5-6.el9_3.5*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatsquid-7:5.2-1.el9_0.4*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatsquid-7:5.5-5.el9_2.3*
SquidUbuntubionic*
SquidUbuntuesm-infra/focal*
SquidUbuntufocal*
SquidUbuntujammy*
SquidUbuntulunar*
SquidUbuntutrusty*
SquidUbuntuupstream*
SquidUbuntuxenial*
Squid3Ubuntubionic*
Squid3Ubuntuesm-infra/bionic*
Squid3Ubuntuesm-infra/xenial*
Squid3Ubuntutrusty*
Squid3Ubuntuxenial*

Potential Mitigations

References