First published: Sat Feb 27 2016(Updated: )
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | =4.0.1 | |
Squid Web Proxy Cache | =4.0.2 | |
Squid Web Proxy Cache | =4.0.3 | |
Squid Web Proxy Cache | =4.0.4 | |
Squid Web Proxy Cache | =4.0.5 | |
Squid Web Proxy Cache | =4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2572 has a severity rating of medium, as it can cause denial of service by crashing the Squid daemon.
To fix CVE-2016-2572, upgrade Squid to version 4.0.7 or later.
CVE-2016-2572 affects Squid versions 4.0.1 through 4.0.6.
CVE-2016-2572 is a denial of service vulnerability caused by handling malformed HTTP responses.
Yes, CVE-2016-2572 can be exploited by remote HTTP servers sending malformed responses.