First published: Wed Sep 10 2014(Updated: )
Sebastian Krahmer discovered an off-by-one error, leading to a heap-based buffer overflow flaw, in the way Squid handled UDP SNMP requests. An unauthenticated, remote attacker could possibly use this flaw to crash Squid or, potentially, execute arbitrary code. As noted in Sebastian's original report, an SNMP port must be configured. The default configuration of Squid for Red Hat Enterprise Linux 6 and 7 does not include an snmp_port declaration (<a href="http://wiki.squid-cache.org/Features/Snmp">http://wiki.squid-cache.org/Features/Snmp</a>). Patch: <a href="http://bugzillafiles.novell.org/attachment.cgi?id=605545">http://bugzillafiles.novell.org/attachment.cgi?id=605545</a> References: <a href="https://bugzilla.novell.com/show_bug.cgi?id=895773">https://bugzilla.novell.com/show_bug.cgi?id=895773</a> <a href="http://seclists.org/oss-sec/2014/q3/542">http://seclists.org/oss-sec/2014/q3/542</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1139967 is high due to the potential for a heap-based buffer overflow that could allow an attacker to crash Squid or execute arbitrary code.
To fix REDHAT-BUG-1139967, it is recommended to update Squid to the latest patched version that addresses the vulnerability.
REDHAT-BUG-1139967 affects the Squid Web Proxy Cache software specifically in how it handles UDP SNMP requests.
Yes, REDHAT-BUG-1139967 can be exploited by an unauthenticated remote attacker.
REDHAT-BUG-1139967 is associated with an off-by-one error that leads to a heap-based buffer overflow.