Synopsis
The remote Debian host is missing one or more security-related updates.
Description
The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4312 advisory.
- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4312-1 [email protected] https://www.debian.org/lts/security/ Bastien Roucaris September 27, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : squid Version : 4.13-10+deb11u5 CVE ID : CVE-2023-5824 CVE-2023-46728 CVE-2025-54574 Debian Bug : 1055249
Three security issues were discovered in the Squid proxy caching server, which could result in the execution of arbitrary code, information disclosure or denial of service.
CVE-2023-5824
A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
CVE-2023-46728
Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway.
The obsolete gopher protocol, even if non functional, was always available and enabled.
Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent.
Gopher support (already non functional) has been removed to fix this CVE.
Note that gopher was deprecated and major browsers removed it, long time ago.
CVE-2025-54574
Squid is vulnerable to a heap buffer overflow and possible remote code execution (RCE) attack when processing URN due to incorrect buffer management.
For Debian 11 bullseye, these problems have been fixed in version 4.13-10+deb11u5.
We recommend that you upgrade your squid packages.
For the detailed security status of squid please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/squid
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Tenable has extracted the preceding description block directly from the Debian security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade the squid packages.
Plugin Details
File Name: debian_DLA-4312.nasl
Agent: unix
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:debian:debian_linux:squidclient, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:squid, p-cpe:/a:debian:debian_linux:squid-purge, p-cpe:/a:debian:debian_linux:squid-common, p-cpe:/a:debian:debian_linux:squid-openssl, p-cpe:/a:debian:debian_linux:squid-cgi
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 9/27/2025
Vulnerability Publication Date: 11/3/2023