Buffer overflow in wccp.c in Squid 2.5 before 2.5.STABLE7 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long WCCP packet, which is processed by a recvfrom function call that uses an incorrect length parameter.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9573
http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-wccp_buffer_overflow.patch
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-wccp_buffer_overflow
http://www.securityfocus.com/bid/12432
http://www.redhat.com/support/errata/RHSA-2005-061.html
http://www.redhat.com/support/errata/RHSA-2005-060.html
http://www.kb.cert.org/vuls/id/886006
http://www.debian.org/security/2005/dsa-667
http://securitytracker.com/id?1013045