CVE-2014-6270

NameCVE-2014-6270
DescriptionOff-by-one error in the snmpHandleUdp function in snmp_core.cc in Squid 2.x and 3.x, when an SNMP port is configured, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted UDP SNMP request, which triggers a heap-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs761002

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid (PTS)sid4.1-1vulnerable
squid3 (PTS)jessie (security), jessie3.4.8-6+deb8u5fixed
stretch (security), stretch3.5.23-5+deb9u1fixed
buster, sid3.5.27-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squidsource(unstable)(unfixed)unimportant
squid3source(unstable)3.4.8-1low761002

Notes

SNMP not built in squid 2
[wheezy] - squid3 <no-dsa> (Minor issue)
[squeeze] - squid3 <no-dsa> (Minor issue)
https://bugzilla.novell.com/show_bug.cgi?id=895773
Upstream commits: http://bazaar.launchpad.net/~squid/squid/trunk/revision/13574
http://bazaar.launchpad.net/~squid/squid/trunk/revision/13582
http://www.squid-cache.org/Advisories/SQUID-2014_3.txt

Search for package or bug name: Reporting problems