Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5400

Опубликовано: 06 июл. 2015
Источник: redhat
CVSS2: 2.3

Описание

Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5squidWill not fix
Red Hat Enterprise Linux 6squidWill not fix
Red Hat Enterprise Linux 7squidWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-200->CWE-391->CWE-392
https://bugzilla.redhat.com/show_bug.cgi?id=1240741squid: information disclosure due to incorrect handling of peer responses in tunnel.cc (SQUID-2015:2)

2.3 Low

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.

nvd
больше 10 лет назад

Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.

debian
больше 10 лет назад

Squid before 3.5.6 does not properly handle CONNECT method peer respon ...

github
больше 3 лет назад

Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.

fstec
больше 10 лет назад

Уязвимость прокси-сервера Squid, позволяющая нарушителю обойти существующие ограничения и получить доступ к серверу

2.3 Low

CVSS2