Description
An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expression, it could either evaluate the top of the stack, or add a new member to the stack. When adding a new member, there is no check to ensure that the stack won't overflow.
Remediation
References
Related Vulnerabilities
MediaWiki Improper Access Control Vulnerability (CVE-2016-6336)
WordPress Plugin Broken Link Checker Cross-Site Scripting (1.10.1)
Chamilo Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2018-1999019)
WordPress Plugin Font Organizer Cross-Site Scripting (2.1.1)
phpBB Server-Side Request Forgery (SSRF) Vulnerability (CVE-2017-1000419)