Name | CVE-2016-10003 |
Description | Incorrect HTTP Request header comparison in Squid HTTP Proxy 3.5.0.1 through 3.5.22, and 4.0.1 through 4.0.16 results in Collapsed Forwarding feature mistakenly identifying some private responses as being suitable for delivery to multiple clients. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 848491 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
squid3 | source | wheezy | (not affected) | |||
squid3 | source | jessie | (not affected) | |||
squid3 | source | (unstable) | 3.5.23-1 | 848491 |
[jessie] - squid3 <not-affected> (Does not affect Squid versions before 3.5.0.1)
[wheezy] - squid3 <not-affected> (Does not affect Squid versions before 3.5.0.1)
Marked as not-affected, vulnerable vulnerability not present due to
the collapsed_forwarding directive beeing added in 3.5.0.1 only
http://www.squid-cache.org/Advisories/SQUID-2016_10.txt
http://www.squid-cache.org/Versions/v4/changesets/squid-4-14956.patch
http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_10_a.patch (for squid-3.5 excluding 3.5.22)
http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14127.patch (for squid 3.5.22 only)
Vulnerable Squid Versions:
3.5.0.1 up to and including 3.5.22
4.0.1 up to and including 4.0.16
https://www.openwall.com/lists/oss-security/2016/12/17/1