PT-2025-31674 · Squid +2 · Squid +2

Starrynight

·

Published

2025-08-01

·

Updated

2025-08-08

·

CVE-2025-54574

CVSS v3.1
9.3
VectorAV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H

**Name of the Vulnerable Software and Affected Versions:**

Squid versions 6.3 and below

Squid versions 4.x through 4.17

Squid versions 5.x through 5.9

**Description:**

Squid is vulnerable to a heap-based buffer overflow when processing Uniform Resource Name (URN) requests due to incorrect buffer management. This allows a remote attacker to potentially execute arbitrary code or leak up to 4KB of heap memory, which may contain sensitive information like session tokens and keys. The vulnerability occurs when processing specially crafted URN Trivial-HTTP responses. Over 53 million instances of the software have been identified, with over 27% potentially vulnerable.

**Recommendations:**

Squid versions prior to 6.4: Update to version 6.4 or later to resolve this issue.

Squid versions 4.x through 4.17: Update to version 6.4 or later to resolve this issue.

Squid versions 5.x through 5.9: Update to version 6.4 or later to resolve this issue.

As a temporary workaround, disable URN access permissions by adding the following to the Squid configuration:

```

acl URN proto URN

http access deny URN

```

Then, restart Squid to apply the changes.

Fix

RCE

Heap Based Buffer Overflow

Weakness Enumeration

Related Identifiers

BDU:2025-09345
CVE-2025-54574
GHSA-W4GV-VW3F-29G3
RHSA-2023:7465
RHSA-2023:7668
RHSA-2024:0072
RHSA-2024:0397
RHSA-2024:0771
RHSA-2024:0772
RHSA-2024:0773

Affected Products

Debian
Red Os
Squid