CVE-2016-10002

NameCVE-2016-10002
DescriptionIncorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-763-1, DSA-3745-1
NVD severitymedium (attack range: remote)
Debian Bugs848493

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid3 (PTS)wheezy3.1.20-2.2+deb7u4vulnerable
wheezy (security)3.1.20-2.2+deb7u7fixed
jessie (security), jessie3.4.8-6+deb8u4fixed
buster, sid, stretch3.5.23-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squid3source(unstable)3.5.23-1medium848493
squid3sourcejessie3.4.8-6+deb8u4mediumDSA-3745-1
squid3sourcewheezy3.1.20-2.2+deb7u7mediumDLA-763-1

Notes

http://www.squid-cache.org/Advisories/SQUID-2016_11.txt
http://bugs.squid-cache.org/show_bug.cgi?id=4169
http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID-2016_11.patch
http://www.squid-cache.org/Versions/v3/3.2/changesets/SQUID-2016_11.patch
http://www.squid-cache.org/Versions/v3/3.3/changesets/SQUID-2016_11.patch
http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_11.patch
http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_11.patch
http://www.squid-cache.org/Versions/v4/changesets/SQUID-2016_11.patch
Vulnerable squid versions:
3.1.10 up to and including 3.1.23
3.2.0.3 up to and including 3.5.22
4.0.1 up to and including 4.0.16
http://www.openwall.com/lists/oss-security/2016/12/17/1

Search for package or bug name: Reporting problems