CVE-2024-25111
📋 TL;DR
CVE-2024-25111 is an uncontrolled recursion vulnerability in Squid's HTTP chunked decoder that allows remote attackers to cause denial of service by sending specially crafted chunked HTTP messages. This affects Squid installations from version 3.5.27 through 6.7. Organizations using Squid as a web proxy or cache server are vulnerable.
💻 Affected Systems
- Squid
📦 What is this software?
Bluexp by Netapp
Fedora by Fedoraproject
Fedora by Fedoraproject
Squid by Squid Cache
⚠️ Risk & Real-World Impact
Worst Case
Complete service outage of Squid proxy, disrupting all web traffic and caching services for dependent systems.
Likely Case
Squid process crashes or becomes unresponsive, requiring manual restart and causing temporary service disruption.
If Mitigated
Limited impact if Squid is behind load balancers with automatic failover or if traffic can be rerouted.
🎯 Exploit Status
Attack requires sending crafted HTTP messages but no authentication needed. No public exploit code identified yet.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.8
Vendor Advisory: https://github.com/squid-cache/squid/security/advisories/GHSA-72c2-c3wm-8qxc
Restart Required: Yes
Instructions:
1. Download Squid 6.8 from squid-cache.org or apply relevant patch from patch archives. 2. Backup current configuration. 3. Install new version following OS package manager or compile from source. 4. Restart Squid service.
🔧 Temporary Workarounds
No workaround available
allThe advisory states there is no workaround for this vulnerability
🧯 If You Can't Patch
- Implement network segmentation to restrict access to Squid instances
- Deploy WAF or reverse proxy in front of Squid to filter malicious HTTP traffic
🔍 How to Verify
Check if Vulnerable:
Check Squid version with 'squid -v' or 'squid --version'. If version is between 3.5.27 and 6.7 inclusive, system is vulnerable.
Check Version:
squid -v || squid --version
Verify Fix Applied:
After patching, verify version is 6.8 or later with 'squid -v'. Test Squid functionality with normal HTTP traffic.
📡 Detection & Monitoring
Log Indicators:
- Multiple process crashes/restarts
- Unusual chunked HTTP requests
- Memory exhaustion errors in logs
Network Indicators:
- Unusually large or malformed chunked HTTP requests to Squid ports
- Traffic patterns causing repeated Squid restarts
SIEM Query:
source="squid" AND ("fatal" OR "crash" OR "restarting")
🔗 References
- http://www.squid-cache.org/Versions/v6/SQUID-2024_1.patch
- https://github.com/squid-cache/squid/security/advisories/GHSA-72c2-c3wm-8qxc
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7R4KPSO3MQT3KAOZV7LC2GG3CYMCGK7H/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWQHRDRHDM5PQTU6BHH4C5KGL37X6TVI/
- https://security.netapp.com/advisory/ntap-20240605-0001/
- http://www.squid-cache.org/Versions/v6/SQUID-2024_1.patch
- https://github.com/squid-cache/squid/security/advisories/GHSA-72c2-c3wm-8qxc
- https://lists.debian.org/debian-lts-announce/2025/03/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7R4KPSO3MQT3KAOZV7LC2GG3CYMCGK7H/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWQHRDRHDM5PQTU6BHH4C5KGL37X6TVI/
- https://security.netapp.com/advisory/ntap-20240605-0001/