Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2023-46728: squid: NULL pointer dereference in the gopher protocol code (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Red Hat: CVE-2023-46728: squid: NULL pointer dereference in the gopher protocol code (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
11/06/2023
Created
01/06/2024
Added
01/05/2024
Modified
09/13/2024

Description

Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.

Solution(s)

  • redhat-upgrade-libecap
  • redhat-upgrade-libecap-debuginfo
  • redhat-upgrade-libecap-debugsource
  • redhat-upgrade-libecap-devel
  • redhat-upgrade-squid
  • redhat-upgrade-squid-debuginfo
  • redhat-upgrade-squid-debugsource
  • redhat-upgrade-squid-migration-script
  • redhat-upgrade-squid-sysvinit

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;