Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-54574

Опубликовано: 01 авг. 2025
Источник: redhat
CVSS3: 8.9
EPSS Низкий

Описание

Squid is a caching proxy for the Web. In versions 6.3 and below, Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when processing URN due to incorrect buffer management. This has been fixed in version 6.4. To work around this issue, disable URN access permissions.

A heap-based buffer overflow flaw was found in the Squid caching proxy. When processing the Uniform Resource Name (URNs), specific conditions can lead to remote code execution.

Отчет

This vulnerability is Important because the heap-based buffer overflow occurs during URN processing in Squid’s core request-handling path, which is exposed to untrusted, remote input. Unlike flaws that merely cause a service crash, this defect allows an attacker to manipulate heap memory structures, potentially achieving arbitrary code execution within the Squid process context. Since Squid often runs with elevated privileges and serves as a gateway between internal and external networks, successful exploitation could provide a remote attacker with direct control over the proxy server, enabling them to pivot into internal systems, intercept sensitive traffic, or alter cached content.

Меры по смягчению последствий

Users can disable URN access permissions to mitigate this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10squidNot affected
Red Hat Enterprise Linux 6squidOut of support scope
Red Hat Enterprise Linux 6squid34Out of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle SupportsquidFixedRHSA-2025:1441425.08.2025
Red Hat Enterprise Linux 8squidFixedRHSA-2023:766806.12.2023
Red Hat Enterprise Linux 8.2 Advanced Update SupportsquidFixedRHSA-2024:077212.02.2024
Red Hat Enterprise Linux 8.2 Telecommunications Update ServicesquidFixedRHSA-2024:077212.02.2024
Red Hat Enterprise Linux 8.2 Update Services for SAP SolutionssquidFixedRHSA-2024:077212.02.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportsquidFixedRHSA-2024:077312.02.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicesquidFixedRHSA-2024:077312.02.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=2386026squid-cache: Squid Buffer Overflow

EPSS

Процентиль: 77%
0.01043
Низкий

8.9 High

CVSS3

Связанные уязвимости

CVSS3: 9.3
ubuntu
3 месяца назад

Squid is a caching proxy for the Web. In versions 6.3 and below, Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when processing URN due to incorrect buffer management. This has been fixed in version 6.4. To work around this issue, disable URN access permissions.

CVSS3: 9.3
nvd
3 месяца назад

Squid is a caching proxy for the Web. In versions 6.3 and below, Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when processing URN due to incorrect buffer management. This has been fixed in version 6.4. To work around this issue, disable URN access permissions.

CVSS3: 9.3
debian
3 месяца назад

Squid is a caching proxy for the Web. In versions 6.3 and below, Squid ...

CVSS3: 9.3
fstec
3 месяца назад

Уязвимость прокси-сервера Squid, связанная с переполнением буфера в динамической памяти при обработке URN-заголовков, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.3
redos
3 месяца назад

Уязвимость squid

EPSS

Процентиль: 77%
0.01043
Низкий

8.9 High

CVSS3