Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-5400

Опубликовано: 28 сент. 2015
Источник: ubuntu
Приоритет: low
CVSS2: 6.8

Описание

Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.

РелизСтатусПримечание
devel

released

3.5.12-1ubuntu6
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
esm-infra/xenial

released

3.5.12-1ubuntu6
precise

ignored

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.5.6-1
utopic

ignored

end of life
vivid

ignored

end of life
vivid/stable-phone-overlay

DNE

Показывать по

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.

nvd
больше 10 лет назад

Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.

debian
больше 10 лет назад

Squid before 3.5.6 does not properly handle CONNECT method peer respon ...

github
больше 3 лет назад

Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.

fstec
больше 10 лет назад

Уязвимость прокси-сервера Squid, позволяющая нарушителю обойти существующие ограничения и получить доступ к серверу

6.8 Medium

CVSS2