DescriptionIncorrect HTTP Request header comparison in Squid HTTP Proxy through 3.5.22, and 4.0.1 through 4.0.16 results in Collapsed Forwarding feature mistakenly identifying some private responses as being suitable for delivery to multiple clients.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs848491

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid3 (PTS)jessie3.4.8-6+deb8u5fixed
jessie (security)3.4.8-6+deb8u6fixed
stretch (security), stretch3.5.23-5+deb9u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squid3sourcejessie(not affected)
squid3sourcewheezy(not affected)


[jessie] - squid3 <not-affected> (Does not affect Squid versions before
[wheezy] - squid3 <not-affected> (Does not affect Squid versions before
Marked as not-affected, vulnerable vulnerability not present due to
the collapsed_forwarding directive beeing added in only (for squid-3.5 excluding 3.5.22) (for squid 3.5.22 only)
Vulnerable Squid Versions: up to and including 3.5.22
4.0.1 up to and including 4.0.16

Search for package or bug name: Reporting problems