Debian dla-4312 : squid - security update

critical Nessus Plugin ID 266025

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4312 advisory.

- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4312-1 [email protected] https://www.debian.org/lts/security/ Bastien Roucaris September 27, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : squid Version : 4.13-10+deb11u5 CVE ID : CVE-2023-5824 CVE-2023-46728 CVE-2025-54574 Debian Bug : 1055249

Three security issues were discovered in the Squid proxy caching server, which could result in the execution of arbitrary code, information disclosure or denial of service.

CVE-2023-5824

A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.

CVE-2023-46728

Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway.
The obsolete gopher protocol, even if non functional, was always available and enabled.
Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent.
Gopher support (already non functional) has been removed to fix this CVE.
Note that gopher was deprecated and major browsers removed it, long time ago.

CVE-2025-54574

Squid is vulnerable to a heap buffer overflow and possible remote code execution (RCE) attack when processing URN due to incorrect buffer management.

For Debian 11 bullseye, these problems have been fixed in version 4.13-10+deb11u5.

We recommend that you upgrade your squid packages.

For the detailed security status of squid please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/squid

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the squid packages.

See Also

https://security-tracker.debian.org/tracker/source-package/squid

https://security-tracker.debian.org/tracker/CVE-2023-46728

https://security-tracker.debian.org/tracker/CVE-2023-5824

https://security-tracker.debian.org/tracker/CVE-2025-54574

https://packages.debian.org/source/bullseye/squid

Plugin Details

Severity: Critical

ID: 266025

File Name: debian_DLA-4312.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/27/2025

Updated: 9/27/2025

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-54574

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:squidclient, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:squid, p-cpe:/a:debian:debian_linux:squid-purge, p-cpe:/a:debian:debian_linux:squid-common, p-cpe:/a:debian:debian_linux:squid-openssl, p-cpe:/a:debian:debian_linux:squid-cgi

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 9/27/2025

Vulnerability Publication Date: 11/3/2023

Reference Information

CVE: CVE-2023-46728, CVE-2023-5824, CVE-2025-54574

IAVB: 2024-B-0168