The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.
Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Link | Tags |
---|---|
http://www.squid-cache.org/Advisories/SQUID-2014_4.txt | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html | vendor advisory |
http://seclists.org/oss-sec/2014/q3/612 | mailing list |
http://secunia.com/advisories/60242 | third party advisory |
https://bugzilla.novell.com/show_bug.cgi?id=891268 | |
http://www.securityfocus.com/bid/69688 | vdb entry |
http://seclists.org/oss-sec/2014/q3/539 | mailing list |
http://ubuntu.com/usn/usn-2422-1 | patch vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html | vendor advisory |
http://seclists.org/oss-sec/2014/q3/626 | mailing list |