logo
DATABASE RESOURCES PRICING ABOUT US

Buffer Overflow

Description

squid:eoan is vulnerable to buffer overflow. An issue was discovered in Squid when Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.


Affected Software


CPE Name Name Version
squid:eoan 4.8-1ubuntu2
squid3:xenial 3.5.12-1ubuntu7
squid3:bionic 3.5.27-1ubuntu1
squid:focal 4.10-1ubuntu1
squid3:stretch 3.5.23-5+deb9u1
squid:3.9 4.10-r0
squid:3.11 4.10-r0
squid:3.11 4.9-r0
squid:3.10 4.8-r1
squid:3.10 4.10-r0

Related