Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody.
https://www.zerodayinitiative.com/advisories/ZDI-21-157/
https://www.debian.org/security/2022/dsa-5171
https://security.gentoo.org/glsa/202105-14
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/
http://www.openwall.com/lists/oss-security/2021/10/04/1
https://github.com/squid-cache/squid/security/advisories/GHSA-rgf3-9v3p-qp82
http://www.squid-cache.org/Versions/
Source: Mitre, NVD
Published: 2021-03-09
Updated: 2024-11-21
Base Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N
Severity: Medium
Base Score: 5.3
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS: 0.10844