Bugzilla – Bug 895773
VUL-1: CVE-2014-6270: squid: off by one in snmp subsystem
Last modified: 2016-12-19 10:22:28 UTC
There is an off by one on the heap inside snmpHandleUdp() function: [...] len = recvfrom(sock, buf, SNMP_REQUEST_SIZE, 0, (struct sockaddr *) &from, &from_len); if (len > 0) { buf[len] = '\0'; [...] The last valid idx for buf is len-1. the LOCAL_ARRAY() macro declares buf as static, so the off-by-one happens on the heap.
Created attachment 605545 [details] squid-snmp-off-by-one.patch squid-snmp-off-by-one.patch
is this squid 3 or also squid 2?
In both. Dont know when they introduced it. Probably when they first introduced SNMP.
in sle10 squid 2.5 already.
Affected packages: SLE-10-SP3-TERADATA: squid SLE-11-SP3: squid, squid3 SLE-11-SP3-PRODUCTS: squid, squid3 SLE-11-SP3-UPTU: squid, squid3
bugbot adjusting priority
CVE-2014-6270
SUSE-SU-2015:0028-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 895773 CVE References: CVE-2014-6270 Sources used: SUSE Linux Enterprise Server 12 (src): squid-3.3.13-4.2
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2015-04-03. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/61243
Is this available for squid on sles11sp3?
This fix should have been included in the next regular squid update (hence VUL-1), but the SWAMP workflow has been canceled. Its still VUL-1, so whenever the next squid update for sp3 is done, this issue should be included. (Its severity does not demand an update on its own).
Fixed by https://build.suse.de/request/show/69070
An update workflow for this issue was started. This issue was rated as important. Please submit fixed packages until 2015-10-23. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62312
SUSE-SU-2015:1983-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 895773,949942 CVE References: CVE-2014-6270,CVE-2014-9749 Sources used: SUSE Linux Enterprise Server for VMWare 11-SP3 (src): squid-2.7.STABLE5-2.12.24.2 SUSE Linux Enterprise Server 11-SP4 (src): squid-2.7.STABLE5-2.12.24.2 SUSE Linux Enterprise Server 11-SP3 (src): squid-2.7.STABLE5-2.12.24.2 SUSE Linux Enterprise Debuginfo 11-SP4 (src): squid-2.7.STABLE5-2.12.24.2 SUSE Linux Enterprise Debuginfo 11-SP3 (src): squid-2.7.STABLE5-2.12.24.2
SUSE-SU-2016:1996-1: An update that fixes 25 vulnerabilities is now available. Category: security (important) Bug References: 895773,902197,938715,963539,967011,968392,968393,968394,968395,973782,973783,976553,976556,976708,979008,979009,979010,979011 CVE References: CVE-2011-3205,CVE-2011-4096,CVE-2012-5643,CVE-2013-0188,CVE-2013-4115,CVE-2014-0128,CVE-2014-6270,CVE-2014-7141,CVE-2014-7142,CVE-2015-5400,CVE-2016-2390,CVE-2016-2569,CVE-2016-2570,CVE-2016-2571,CVE-2016-2572,CVE-2016-3947,CVE-2016-3948,CVE-2016-4051,CVE-2016-4052,CVE-2016-4053,CVE-2016-4054,CVE-2016-4553,CVE-2016-4554,CVE-2016-4555,CVE-2016-4556 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): squid3-3.1.23-8.16.27.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): squid3-3.1.23-8.16.27.1
SUSE-SU-2016:2089-1: An update that fixes 25 vulnerabilities is now available. Category: security (important) Bug References: 895773,902197,938715,963539,967011,968392,968393,968394,968395,973782,973783,976553,976556,976708,979008,979009,979010,979011,993299 CVE References: CVE-2011-3205,CVE-2011-4096,CVE-2012-5643,CVE-2013-0188,CVE-2013-4115,CVE-2014-0128,CVE-2014-6270,CVE-2014-7141,CVE-2014-7142,CVE-2015-5400,CVE-2016-2390,CVE-2016-2569,CVE-2016-2570,CVE-2016-2571,CVE-2016-2572,CVE-2016-3947,CVE-2016-3948,CVE-2016-4051,CVE-2016-4052,CVE-2016-4053,CVE-2016-4054,CVE-2016-4553,CVE-2016-4554,CVE-2016-4555,CVE-2016-4556 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): squid3-3.1.23-8.16.30.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): squid3-3.1.23-8.16.30.1
all fixed