First published: Mon May 09 2016(Updated: )
client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/squid | <3.5.18 | 3.5.18 |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
Squid Web Proxy Cache | <=3.5.17 | |
Squid Web Proxy Cache | =4.0.1 | |
Squid Web Proxy Cache | =4.0.2 | |
Squid Web Proxy Cache | =4.0.3 | |
Squid Web Proxy Cache | =4.0.4 | |
Squid Web Proxy Cache | =4.0.5 | |
Squid Web Proxy Cache | =4.0.6 | |
Squid Web Proxy Cache | =4.0.7 | |
Squid Web Proxy Cache | =4.0.8 | |
Squid Web Proxy Cache | =4.0.9 | |
Oracle Linux | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4553 has a critical severity level as it allows remote attackers to conduct cache-poisoning attacks by exploiting improper handling of the Host header.
To fix CVE-2016-4553, upgrade Squid to version 3.5.18 or 4.0.10 or later.
CVE-2016-4553 affects Squid versions prior to 3.5.18 and all versions in the 4.x series prior to 4.0.10.
CVE-2016-4553 can enable cache-poisoning attacks, allowing attackers to serve malicious content to users.
CVE-2016-4553 is particularly relevant for deployments using affected Squid versions that handle HTTP requests without proper validation.