CVE-2024-25617

MEDIUM

Squid <6.5 - DoS

Title source: llm
STIX 2.1

Description

Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Collapse of Data into Unsafe Value bug ,Squid may be vulnerable to a Denial of Service attack against HTTP header parsing. This problem allows a remote client or a remote server to perform Denial of Service when sending oversized headers in HTTP messages. In versions of Squid prior to 6.5 this can be achieved if the request_header_max_size or reply_header_max_size settings are unchanged from the default. In Squid version 6.5 and later, the default setting of these parameters is safe. Squid will emit a critical warning in cache.log if the administrator is setting these parameters to unsafe values. Squid will not at this time prevent these settings from being changed to unsafe values. Users are advised to upgrade to version 6.5. There are no known workarounds for this vulnerability. This issue is also tracked as SQUID-2024:2

References (3)

Core 3
Core References
Patch, Third Party Advisory, Vendor Advisory
https://security.netapp.com/advisory/ntap-20240322-0006/
Mitigation, Third Party Advisory, Vendor Advisory x_refsource_confirm
https://github.com/squid-cache/squid/security/advisories/GHSA-h5x6-w8mv-xfpr

Scores

CVSS v3 5.3
EPSS 0.0117
EPSS Percentile 78.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-400 CWE-182
Status published
Products (2)
netapp/bluexp
squid-cache/squid 3.0 - 6.5
Published Feb 14, 2024
Tracked Since Feb 18, 2026