First published: Fri Jan 27 2017(Updated: )
Incorrect HTTP Request header comparison in Squid HTTP Proxy 3.5.0.1 through 3.5.22, and 4.0.1 through 4.0.16 results in Collapsed Forwarding feature mistakenly identifying some private responses as being suitable for delivery to multiple clients.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | =3.5.0.1 | |
Squid-Cache Squid | =3.5.0.2 | |
Squid-Cache Squid | =3.5.0.3 | |
Squid-Cache Squid | =3.5.0.4 | |
Squid-Cache Squid | =3.5.1 | |
Squid-Cache Squid | =3.5.2 | |
Squid-Cache Squid | =3.5.3 | |
Squid-Cache Squid | =3.5.4 | |
Squid-Cache Squid | =3.5.5 | |
Squid-Cache Squid | =3.5.6 | |
Squid-Cache Squid | =3.5.7 | |
Squid-Cache Squid | =3.5.8 | |
Squid-Cache Squid | =3.5.9 | |
Squid-Cache Squid | =3.5.10 | |
Squid-Cache Squid | =3.5.11 | |
Squid-Cache Squid | =3.5.12 | |
Squid-Cache Squid | =3.5.13 | |
Squid-Cache Squid | =3.5.14 | |
Squid-Cache Squid | =3.5.15 | |
Squid-Cache Squid | =3.5.16 | |
Squid-Cache Squid | =3.5.17 | |
Squid-Cache Squid | =3.5.18 | |
Squid-Cache Squid | =3.5.19 | |
Squid-Cache Squid | =3.5.20 | |
Squid-Cache Squid | =3.5.21 | |
Squid-Cache Squid | =3.5.22 | |
Squid-Cache Squid | =4.0.1 | |
Squid-Cache Squid | =4.0.2 | |
Squid-Cache Squid | =4.0.3 | |
Squid-Cache Squid | =4.0.4 | |
Squid-Cache Squid | =4.0.5 | |
Squid-Cache Squid | =4.0.6 | |
Squid-Cache Squid | =4.0.7 | |
Squid-Cache Squid | =4.0.8 | |
Squid-Cache Squid | =4.0.9 | |
Squid-Cache Squid | =4.0.10 | |
Squid-Cache Squid | =4.0.11 | |
Squid-Cache Squid | =4.0.12 | |
Squid-Cache Squid | =4.0.13 | |
Squid-Cache Squid | =4.0.14 | |
Squid-Cache Squid | =4.0.15 | |
Squid-Cache Squid | =4.0.16 | |
Squid-Cache Squid | >=3.5.0.1<3.5.23 | |
Squid-Cache Squid | >=4.0.1<4.0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.