CVE-2014-6270

NameCVE-2014-6270
DescriptionOff-by-one error in the snmpHandleUdp function in snmp_core.cc in Squid 2.x and 3.x, when an SNMP port is configured, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted UDP SNMP request, which triggers a heap-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs761002

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid (PTS)buster (security), buster, buster (lts)4.6-1+deb10u10fixed
bullseye (security), bullseye4.13-10+deb11u3fixed
bookworm (security), bookworm5.7-2+deb12u2fixed
sid, trixie6.12-1fixed
squid3 (PTS)jessie, jessie (lts)3.5.23-5+deb8u7fixed
stretch (security)3.5.23-5+deb9u7fixed
stretch (lts), stretch3.5.23-5+deb9u10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squidsource(unstable)4.1-1unimportant
squid3source(unstable)3.4.8-1low761002

Notes

SNMP was not built in squid 2.x
[wheezy] - squid3 <no-dsa> (Minor issue)
[squeeze] - squid3 <no-dsa> (Minor issue)
https://bugzilla.suse.com/show_bug.cgi?id=895773
Upstream commits: http://bazaar.launchpad.net/~squid/squid/trunk/revision/13574
http://bazaar.launchpad.net/~squid/squid/trunk/revision/13582
http://www.squid-cache.org/Advisories/SQUID-2014_3.txt

Search for package or bug name: Reporting problems