First published: Mon Mar 07 2016(Updated: )
Sebastian Krahmer discovered that Squid incorrectly handled certain SNMP requests. If SNMP is enabled, a remote attacker could use this issue to cause Squid to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2014-6270) Alex Rousskov discovered that Squid incorrectly handled certain malformed responses. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2016-2571)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/squid3 | <3.3.8-1ubuntu16.2 | 3.3.8-1ubuntu16.2 |
=15.10 | ||
All of | ||
ubuntu/squid3 | <3.3.8-1ubuntu6.6 | 3.3.8-1ubuntu6.6 |
=14.04 | ||
All of | ||
ubuntu/squid3 | <3.1.19-1ubuntu3.12.04.6 | 3.1.19-1ubuntu3.12.04.6 |
=12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2014-6270.
The severity of CVE-2014-6270 is high.
CVE-2014-6270 affects Squid by allowing a remote attacker to cause a denial of service or possibly execute arbitrary code.
The recommended version of Squid3 to fix CVE-2014-6270 is 3.3.8-1ubuntu16.2.
You can find more information about CVE-2014-6270 at the following link: [CVE-2014-6270](https://ubuntu.com/security/CVE-2014-6270)