Heap-based buffer overflow in Squid and Oracle Solaris - CVE-2014-6270
Published: September 12, 2014 / Updated: October 4, 2021
Oracle
Squid
Oracle Solaris
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Off-by-one error in the snmpHandleUdp function in snmp_core.cc in Squid 2.x and 3.x, when an SNMP port is configured,. A remote attacker can use a crafted UDP SNMP request to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2014-6270
Sources
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://seclists.org/oss-sec/2014/q3/542
- http://seclists.org/oss-sec/2014/q3/550
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/69686
- http://www.ubuntu.com/usn/USN-2921-1
- https://bugzilla.novell.com/show_bug.cgi?id=895773
- https://bugzilla.redhat.com/show_bug.cgi?id=1139967
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95873
- https://security.gentoo.org/glsa/201607-01