CVE-2016-10002

NameCVE-2016-10002
DescriptionIncorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-763-1, DSA-3745-1
Debian Bugs848493

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squid3sourcewheezy3.1.20-2.2+deb7u7DLA-763-1
squid3sourcejessie3.4.8-6+deb8u4DSA-3745-1
squid3source(unstable)3.5.23-1848493

Notes

http://www.squid-cache.org/Advisories/SQUID-2016_11.txt
http://bugs.squid-cache.org/show_bug.cgi?id=4169
http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID-2016_11.patch
http://www.squid-cache.org/Versions/v3/3.2/changesets/SQUID-2016_11.patch
http://www.squid-cache.org/Versions/v3/3.3/changesets/SQUID-2016_11.patch
http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_11.patch
http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_11.patch
http://www.squid-cache.org/Versions/v4/changesets/SQUID-2016_11.patch
Vulnerable squid versions:
3.1.10 up to and including 3.1.23
3.2.0.3 up to and including 3.5.22
4.0.1 up to and including 4.0.16
https://www.openwall.com/lists/oss-security/2016/12/17/1

Search for package or bug name: Reporting problems