Squid.Proxy.URN.Response.Processing.Heap.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in Squid Project Squid.
An unauthenticated, remote attacker can exploit this vulnerability by sending a request for a URN with an NID corresponding to an attacker controlled host, then sending a crafted response to the request forwarded by Squid. Successful exploitation could result in the execution of arbitrary code under the security context of the squid process.
Affected Products
Squid Project Squid 3.x through 3.5.28
Squid Project Squid 4.x through 4.8
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
http://www.squid-cache.org/Advisories/SQUID-2019_7.txt
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-03-12 | 15.795 | Default_action:pass:drop |
2019-11-27 | 15.734 | |
2019-11-27 | 15.733 | |
2019-11-27 | 15.732 |