Impact
Squid, a widely used web caching proxy, contains a heap use‑after‑free bug triggered during ICP response handling. The bug arises from premature release of resources before their intended lifetime, allowing remote attackers to send crafted ICP traffic and cause the service to crash or become unreachable. The impact is a complete denial of service to all users of the affected proxy.
Affected Systems
Any installation of Squid older than version 7.5 that has ICP enabled (icp_port set to a non‑zero value). This includes typical server deployments that accept ICP queries for cache coordination. Clients interacting with such a proxy would experience service interruption once the vulnerable process terminates.
Risk and Exploitability
The vulnerability scores 8.7 on the CVSS scale, indicating a high severity. The exploit probability according to EPSS is low at <1 %, and the issue is not yet listed in the CISA Known Exploited Vulnerabilities catalog. Despite the limited probability, the attack vector is remote and straightforward: an adversary can trigger the crash by sending malformed ICP packets. Because the issue cannot be mitigated by access rules such as icp_access, the only definitive protection is to update the software.
OpenCVE Enrichment
Ubuntu USN