The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.squid-cache.org/Advisories/SQUID-2014_4.txt | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html | vendor advisory |
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html | third party advisory |
http://secunia.com/advisories/60242 | third party advisory permissions required |
https://bugzilla.novell.com/show_bug.cgi?id=891268 | issue tracking vdb entry third party advisory |
http://seclists.org/oss-sec/2014/q3/613 | third party advisory mailing list |
http://seclists.org/oss-sec/2014/q3/539 | third party advisory mailing list |
http://www.securityfocus.com/bid/70022 | vdb entry |
http://ubuntu.com/usn/usn-2422-1 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html | vendor advisory |
http://seclists.org/oss-sec/2014/q3/626 | third party advisory mailing list |