http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2600.html - | |
References | () http://www.openwall.com/lists/oss-security/2016/02/26/2 - | |
References | () http://www.securitytracker.com/id/1035101 - | |
References | () http://www.squid-cache.org/Advisories/SQUID-2016_2.txt - Vendor Advisory | |
References | () http://www.squid-cache.org/Versions/v4/changesets/squid-4-14548.patch - Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201607-01 - |
Information
Published : 2016-02-27 05:59
Updated : 2024-11-21 02:48
NVD link : CVE-2016-2572
Mitre link : CVE-2016-2572
CVE.ORG link : CVE-2016-2572
JSON object : View
Products Affected
squid-cache
- squid
CWE
CWE-20
Improper Input Validation