Your submission was sent successfully! Close

CVE-2016-2572

Published: 27 February 2016

http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
squid3
Launchpad, Ubuntu, Debian
Upstream
Released (3.5.15, 4.0.7)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(3.3.8-1ubuntu17)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was not-affected [3.3.8-1ubuntu6.4])

Notes

AuthorNote
mdeslaur
This CVE is only for the 'Do not use parsing leftovers, such as
HTTP response status code' part of the squid-4-14548.patch
patch. As such, it is 4.x only.

References