CVE-2014-6270

NameCVE-2014-6270
DescriptionOff-by-one error in the snmpHandleUdp function in snmp_core.cc in Squid 2.x and 3.x, when an SNMP port is configured, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted UDP SNMP request, which triggers a heap-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs761002

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid (PTS)buster4.6-1+deb10u7fixed
buster (security)4.6-1+deb10u10fixed
bullseye4.13-10+deb11u2fixed
bullseye (security)4.13-10+deb11u3fixed
bookworm5.7-2fixed
bookworm (security)5.7-2+deb12u1fixed
trixie6.6-1fixed
sid6.8-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squidsource(unstable)4.1-1unimportant
squid3source(unstable)3.4.8-1low761002

Notes

SNMP was not built in squid 2.x
[wheezy] - squid3 <no-dsa> (Minor issue)
[squeeze] - squid3 <no-dsa> (Minor issue)
https://bugzilla.suse.com/show_bug.cgi?id=895773
Upstream commits: http://bazaar.launchpad.net/~squid/squid/trunk/revision/13574
http://bazaar.launchpad.net/~squid/squid/trunk/revision/13582
http://www.squid-cache.org/Advisories/SQUID-2014_3.txt

Search for package or bug name: Reporting problems