CVE-2023-46724
Public on 2023-11-01
Modified on 2024-02-09
Description
When Squid is compiled with SSL support (i.e. where it can encrypt/decrypt requests/responses rather than using a CONNECT tunnel), the function check_domain is used to check whether a request domain’s name is the same domain (or is equally valid) as in the certificate the server offers. While zero-length domains are rejected before the matchDomainName function as called from check_domain is ever called, if a certificate offers the CNAME as simply * (which would mean all domains), a pointer pointing to an empty/null character is passed to matchDomainName which can either produce junk data, or can cause a crash; or do nothing as it is undefined behavior.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | squid | 2023-11-10 | ALAS-2023-1886 | Fixed |
Amazon Linux 2 - Core | squid | 2023-11-29 | ALAS2-2023-2354 | Fixed |
Amazon Linux 2023 | squid | 2023-11-09 | ALAS2023-2023-429 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
NVD | CVSSv3 | 8.6 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |