Off-by-one error in the snmpHandleUdp function in snmp_core.cc in Squid 2.x and 3.x, when an SNMP port is configured, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted UDP SNMP request, which triggers a heap-based buffer overflow.
https://security.gentoo.org/glsa/201607-01
https://exchange.xforce.ibmcloud.com/vulnerabilities/95873
https://bugzilla.redhat.com/show_bug.cgi?id=1139967
https://bugzilla.novell.com/show_bug.cgi?id=895773
http://www.ubuntu.com/usn/USN-2921-1
http://www.securityfocus.com/bid/69686
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://seclists.org/oss-sec/2014/q3/550
http://seclists.org/oss-sec/2014/q3/542
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html