Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46728: CWE-476: NULL Pointer Dereference in squid-cache squid

0
High
VulnerabilityCVE-2023-46728cvecve-2023-46728cwe-476
Published: Mon Nov 06 2023 (11/06/2023, 17:13:45 UTC)
Source: CVE Database V5
Vendor/Project: squid-cache
Product: squid

Description

Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:47:50 UTC

Technical Analysis

CVE-2023-46728 is a vulnerability identified in the Squid caching proxy software, specifically affecting versions prior to 6.0.1. Squid supports multiple protocols including HTTP, HTTPS, FTP, and Gopher. The vulnerability arises from a NULL pointer dereference within Squid's Gopher gateway implementation, classified under CWE-476. This bug can be triggered remotely without authentication or user interaction by sending specially crafted Gopher protocol responses to the proxy. Because Gopher support is enabled by default in affected versions, any Gopher server response—even from non-malicious servers—can cause Squid to dereference a NULL pointer, leading to a crash and resulting in a denial of service (DoS). The impact is limited to availability; confidentiality and integrity are not affected. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high severity due to network attack vector, low attack complexity, and no privileges or user interaction required. Squid 6.0.1 addresses this issue by removing Gopher support entirely, eliminating the attack surface. For users who cannot upgrade immediately, the recommended mitigation is to reject all Gopher URL requests to prevent triggering the bug. No exploits have been reported in the wild so far, but the vulnerability's characteristics make it a credible threat to proxy availability.

Potential Impact

For European organizations, the primary impact of CVE-2023-46728 is the potential for denial of service on Squid proxy servers, which are widely used for web caching, content filtering, and access control. Disruption of Squid services can degrade network performance, interrupt user access to web resources, and impact business continuity. This is particularly critical for organizations relying on Squid proxies as a central component of their network infrastructure, including ISPs, educational institutions, government agencies, and enterprises. Since the vulnerability can be triggered remotely without authentication, attackers can cause service outages with minimal effort. Although no data confidentiality or integrity loss occurs, availability degradation can lead to operational disruptions and increased support costs. European organizations with strict uptime requirements or regulatory obligations for service availability must address this vulnerability promptly. The removal of Gopher support in newer versions also reduces attack surface, but legacy systems remain at risk if not updated or properly configured.

Mitigation Recommendations

1. Upgrade Squid to version 6.0.1 or later, which removes Gopher support and fixes the vulnerability. 2. If immediate upgrade is not feasible, configure Squid to reject or block all Gopher protocol URL requests to prevent triggering the NULL pointer dereference. This can be done by adjusting access control lists (ACLs) or filtering rules to deny gopher:// URLs. 3. Monitor network traffic for unusual Gopher protocol requests or spikes that could indicate exploitation attempts. 4. Implement network-level filtering to block outbound and inbound Gopher traffic where it is not required, reducing exposure. 5. Regularly audit proxy configurations and logs to detect potential crashes or service interruptions related to this vulnerability. 6. Plan for timely patch management and vulnerability scanning to identify and remediate outdated Squid installations. 7. Educate network administrators about the risks associated with legacy protocols like Gopher and the importance of disabling unused services. These targeted steps go beyond generic advice by focusing on protocol-specific controls and operational monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2023-10-25T14:30:33.751Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6908f50bf612d110fe9cbe5c

Added to database: 11/3/2025, 6:31:39 PM

Last enriched: 11/3/2025, 6:47:50 PM

Last updated: 11/6/2025, 9:10:12 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats