CVE-2024-25111

Name
CVE-2024-25111
Description
Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC http://www.squid-cache.org/Versions/v6/SQUID-2024_1.patch
CONFIRM https://github.com/squid-cache/squid/security/advisories/GHSA-72c2-c3wm-8qxc
security-advisories@github.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7R4KPSO3MQT3KAOZV7LC2GG3CYMCGK7H/
security-advisories@github.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWQHRDRHDM5PQTU6BHH4C5KGL37X6TVI/
https://security.netapp.com/advisory/ntap-20240605-0001/

Match rules

CPE URI Source package Min version Max version
squid >= 3.5.27 < 6.8

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
squid 3.19-main 6.6-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
squid 3.18-main 5.9-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
squid 3.17-main 5.7-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable