We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54574

Squid's URN Handling can lead to Buffer Overflow



Description

Squid is a caching proxy for the Web. In versions 6.3 and below, Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when processing URN due to incorrect buffer management. This has been fixed in version 6.4. To work around this issue, disable URN access permissions.

Reserved 2025-07-25 | Published 2025-08-01 | Updated 2025-08-01 | Assigner GitHub_M


CRITICAL: 9.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H

Problem types

CWE-122: Heap-based Buffer Overflow

Product status

< 6.4
affected

References

github.com/.../squid/security/advisories/GHSA-w4gv-vw3f-29g3

github.com/...ommit/a27bf4b84da23594150c7a86a23435df0b35b988

github.com/squid-cache/squid/releases/tag/SQUID_6_4

cve.org (CVE-2025-54574)

nvd.nist.gov (CVE-2025-54574)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54574

Support options

Helpdesk Chat, Email, Knowledgebase