Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2012-2213

Published: 28 April 2012

** DISPUTED ** Squid 3.1.9 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher is unable to provide a squid.conf file for a vulnerable system, and the observed behavior is consistent with a squid.conf file that was (perhaps inadvertently) designed to allow access based on a "req_header Host" acl regex that matches www.uol.com.br.

Notes

AuthorNote
mdeslaur
Need to check, see reproducer in original post
sbeattie
dropping to low, as it requires a specific configuration
using Host header filtering
also, upstream does not have a fix for this.
seth-arnold
still unable to find a configuration that could demonstrate the
problem; as of 2013-01-28, no fix from upstream either.
mdeslaur
Disputed, so ignored.

Priority

Low

Status

Package Release Status
squid
Launchpad, Ubuntu, Debian
hardy Ignored
(end of life)
lucid Ignored
(end of life)
natty Ignored
(end of life)
oneiric Ignored
(end of life)
precise Does not exist

quantal Does not exist

raring Does not exist

upstream Needs triage

squid3
Launchpad, Ubuntu, Debian
hardy Ignored
(end of life)
lucid Ignored
(end of life)
natty Ignored
(end of life)
oneiric Ignored
(end of life)
precise Ignored

quantal Ignored

raring Ignored

upstream Needs triage