Off-by-one error in the snmpHandleUdp function in snmp_core.cc in Squid 2.x and 3.x, when an SNMP port is configured, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted UDP SNMP request, which triggers a heap-based buffer overflow.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1139967 | Issue Tracking Third Party Advisory VDB Entry |
http://seclists.org/oss-sec/2014/q3/542 | Patch Third Party Advisory VDB Entry |
https://bugzilla.novell.com/show_bug.cgi?id=895773 | Issue Tracking Third Party Advisory VDB Entry |
http://seclists.org/oss-sec/2014/q3/550 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/69686 | Third Party Advisory VDB Entry |
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html | Third Party Advisory |
https://security.gentoo.org/glsa/201607-01 | |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html | |
http://www.ubuntu.com/usn/USN-2921-1 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/95873 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2014-09-12 07:55
Updated : 2017-09-07 18:29
NVD link : CVE-2014-6270
Mitre link : CVE-2014-6270
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
oracle
- solaris
squid-cache
- squid