#VU32299 Buffer overflow in Squid - CVE-2016-4053
Published: April 25, 2016 / Updated: July 28, 2020
Squid
Squid-cache.org
Description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.
Remediation
External links
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/04/20/6
- http://www.openwall.com/lists/oss-security/2016/04/20/9
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/86788
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1035647
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01