PT-2025-31674 · Squid +5 · Squid +6

Starrynight

·

Published

2023-11-22

·

Updated

2025-10-11

·

CVE-2025-54574

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Squid versions 6.3 and below Squid versions 4.x through 4.17 Squid versions 5.x through 5.9
Description Squid is vulnerable to a heap-based buffer overflow when processing Uniform Resource Name (URN) requests due to incorrect buffer management. This allows a remote attacker to potentially execute arbitrary code or leak up to 4KB of heap memory, which may contain sensitive information like session tokens and keys. The vulnerability occurs when processing specially crafted URN Trivial-HTTP responses. Over 53 million instances of the software have been identified, with over 27% potentially vulnerable.
Recommendations Squid versions prior to 6.4: Update to version 6.4 or later to resolve this issue. Squid versions 4.x through 4.17: Update to version 6.4 or later to resolve this issue. Squid versions 5.x through 5.9: Update to version 6.4 or later to resolve this issue. As a temporary workaround, disable URN access permissions by adding the following to the Squid configuration:
acl URN proto URN
http access deny URN
Then, restart Squid to apply the changes.

Fix

RCE

Heap Based Buffer Overflow

Memory Corruption

Weakness Enumeration

Related Identifiers

BDU:2025-09345
CESA-2023_7668
CVE-2025-54574
DLA-4312-1
DSA-5982-1
GHSA-W4GV-VW3F-29G3
RHSA-2023:7465
RHSA-2023:7668
RHSA-2023_7465
RHSA-2023_7668
RHSA-2024:0072
RHSA-2024:0397
RHSA-2024:0771
RHSA-2024:0772
RHSA-2024:0773
RHSA-2024:1153
RHSA-2025:14414

Affected Products

Astra Linux
Centos
Debian
Red Hat
Red Os
Squid
Squid Cache