First published: Tue Apr 19 2016(Updated: )
The FwdState::connectedToPeer method in FwdState.cc in Squid before 3.5.14 and 4.0.x before 4.0.6 does not properly handle SSL handshake errors when built with the --with-openssl option, which allows remote attackers to cause a denial of service (application crash) via a plaintext HTTP message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | <=3.5.13 | |
Squid Web Proxy Cache | =4.0.4 | |
Squid Web Proxy Cache | =4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2390 is rated as a medium severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2016-2390, upgrade Squid to version 3.5.14 or later, and 4.0.6 or later.
CVE-2016-2390 affects Squid versions up to and including 3.5.13, as well as the specific versions 4.0.4 and 4.0.5.
CVE-2016-2390 allows remote attackers to cause an application crash through improper handling of SSL handshake errors.
CVE-2016-2390 impacts the FwdState::connectedToPeer method in the FwdState.cc file of Squid.