CVE-2023-46728: CWE-476: NULL Pointer Dereference in squid-cache squid
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
AI Analysis
Technical Summary
CVE-2023-46728 is a vulnerability identified in the Squid caching proxy software, specifically affecting versions prior to 6.0.1. Squid supports multiple protocols including HTTP, HTTPS, FTP, and Gopher. The vulnerability arises from a NULL pointer dereference within Squid's Gopher gateway implementation, classified under CWE-476. This bug can be triggered remotely without authentication or user interaction by sending specially crafted Gopher protocol responses to the proxy. Because Gopher support is enabled by default in affected versions, any Gopher server response—even from non-malicious servers—can cause Squid to dereference a NULL pointer, leading to a crash and resulting in a denial of service (DoS). The impact is limited to availability; confidentiality and integrity are not affected. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high severity due to network attack vector, low attack complexity, and no privileges or user interaction required. Squid 6.0.1 addresses this issue by removing Gopher support entirely, eliminating the attack surface. For users who cannot upgrade immediately, the recommended mitigation is to reject all Gopher URL requests to prevent triggering the bug. No exploits have been reported in the wild so far, but the vulnerability's characteristics make it a credible threat to proxy availability.
Potential Impact
For European organizations, the primary impact of CVE-2023-46728 is the potential for denial of service on Squid proxy servers, which are widely used for web caching, content filtering, and access control. Disruption of Squid services can degrade network performance, interrupt user access to web resources, and impact business continuity. This is particularly critical for organizations relying on Squid proxies as a central component of their network infrastructure, including ISPs, educational institutions, government agencies, and enterprises. Since the vulnerability can be triggered remotely without authentication, attackers can cause service outages with minimal effort. Although no data confidentiality or integrity loss occurs, availability degradation can lead to operational disruptions and increased support costs. European organizations with strict uptime requirements or regulatory obligations for service availability must address this vulnerability promptly. The removal of Gopher support in newer versions also reduces attack surface, but legacy systems remain at risk if not updated or properly configured.
Mitigation Recommendations
1. Upgrade Squid to version 6.0.1 or later, which removes Gopher support and fixes the vulnerability. 2. If immediate upgrade is not feasible, configure Squid to reject or block all Gopher protocol URL requests to prevent triggering the NULL pointer dereference. This can be done by adjusting access control lists (ACLs) or filtering rules to deny gopher:// URLs. 3. Monitor network traffic for unusual Gopher protocol requests or spikes that could indicate exploitation attempts. 4. Implement network-level filtering to block outbound and inbound Gopher traffic where it is not required, reducing exposure. 5. Regularly audit proxy configurations and logs to detect potential crashes or service interruptions related to this vulnerability. 6. Plan for timely patch management and vulnerability scanning to identify and remediate outdated Squid installations. 7. Educate network administrators about the risks associated with legacy protocols like Gopher and the importance of disabling unused services. These targeted steps go beyond generic advice by focusing on protocol-specific controls and operational monitoring.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-46728: CWE-476: NULL Pointer Dereference in squid-cache squid
Description
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
AI-Powered Analysis
Technical Analysis
CVE-2023-46728 is a vulnerability identified in the Squid caching proxy software, specifically affecting versions prior to 6.0.1. Squid supports multiple protocols including HTTP, HTTPS, FTP, and Gopher. The vulnerability arises from a NULL pointer dereference within Squid's Gopher gateway implementation, classified under CWE-476. This bug can be triggered remotely without authentication or user interaction by sending specially crafted Gopher protocol responses to the proxy. Because Gopher support is enabled by default in affected versions, any Gopher server response—even from non-malicious servers—can cause Squid to dereference a NULL pointer, leading to a crash and resulting in a denial of service (DoS). The impact is limited to availability; confidentiality and integrity are not affected. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high severity due to network attack vector, low attack complexity, and no privileges or user interaction required. Squid 6.0.1 addresses this issue by removing Gopher support entirely, eliminating the attack surface. For users who cannot upgrade immediately, the recommended mitigation is to reject all Gopher URL requests to prevent triggering the bug. No exploits have been reported in the wild so far, but the vulnerability's characteristics make it a credible threat to proxy availability.
Potential Impact
For European organizations, the primary impact of CVE-2023-46728 is the potential for denial of service on Squid proxy servers, which are widely used for web caching, content filtering, and access control. Disruption of Squid services can degrade network performance, interrupt user access to web resources, and impact business continuity. This is particularly critical for organizations relying on Squid proxies as a central component of their network infrastructure, including ISPs, educational institutions, government agencies, and enterprises. Since the vulnerability can be triggered remotely without authentication, attackers can cause service outages with minimal effort. Although no data confidentiality or integrity loss occurs, availability degradation can lead to operational disruptions and increased support costs. European organizations with strict uptime requirements or regulatory obligations for service availability must address this vulnerability promptly. The removal of Gopher support in newer versions also reduces attack surface, but legacy systems remain at risk if not updated or properly configured.
Mitigation Recommendations
1. Upgrade Squid to version 6.0.1 or later, which removes Gopher support and fixes the vulnerability. 2. If immediate upgrade is not feasible, configure Squid to reject or block all Gopher protocol URL requests to prevent triggering the NULL pointer dereference. This can be done by adjusting access control lists (ACLs) or filtering rules to deny gopher:// URLs. 3. Monitor network traffic for unusual Gopher protocol requests or spikes that could indicate exploitation attempts. 4. Implement network-level filtering to block outbound and inbound Gopher traffic where it is not required, reducing exposure. 5. Regularly audit proxy configurations and logs to detect potential crashes or service interruptions related to this vulnerability. 6. Plan for timely patch management and vulnerability scanning to identify and remediate outdated Squid installations. 7. Educate network administrators about the risks associated with legacy protocols like Gopher and the importance of disabling unused services. These targeted steps go beyond generic advice by focusing on protocol-specific controls and operational monitoring.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2023-10-25T14:30:33.751Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6908f50bf612d110fe9cbe5c
Added to database: 11/3/2025, 6:31:39 PM
Last enriched: 11/3/2025, 6:47:50 PM
Last updated: 11/6/2025, 9:10:12 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumCVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.