Off-by-one error in the snmpHandleUdp function in snmp_core.cc in Squid 2.x and 3.x, when an SNMP port is configured, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted UDP SNMP request, which triggers a heap-based buffer overflow.
lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
seclists.org/oss-sec/2014/q3/542
seclists.org/oss-sec/2014/q3/550
www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
www.securityfocus.com/bid/69686
www.ubuntu.com/usn/USN-2921-1
bugzilla.novell.com/show_bug.cgi?id=895773
bugzilla.redhat.com/show_bug.cgi?id=1139967
exchange.xforce.ibmcloud.com/vulnerabilities/95873
security.gentoo.org/glsa/201607-01