CVE-2016-4054
critical-risk
Published 2016-04-25
Buffer overflow in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allows remote attackers to execute arbitrary code via crafted Edge Side Includes (ESI) responses.
Do I need to act?
!
79.9% chance of exploitation in next 30 days
EPSS score — higher than 20% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (20)
Affected Vendors
References (30)
Release Notes
http://www.openwall.com/lists/oss-security/2016/04/20/6
Release Notes
http://www.openwall.com/lists/oss-security/2016/04/20/9
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.h...
Third Party Advisory
http://www.securitytracker.com/id/1035647
Vendor Advisory
http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
Third Party Advisory
http://www.ubuntu.com/usn/USN-2995-1
Release Notes
http://www.openwall.com/lists/oss-security/2016/04/20/6
and 10 more references
76
/ 100
critical-risk
Severity
24/34 · High
Exploitability
20/34 · Moderate
Exposure
32/34 · Critical