Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-10002

Опубликовано: 27 янв. 2017
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5
CVSS3: 7.5

Описание

Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.

РелизСтатусПримечание
devel

released

3.5.12-1ubuntu9
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [3.3.8-1ubuntu6.9]]
esm-infra/xenial

released

3.5.12-1ubuntu7.3
precise

released

3.1.19-1ubuntu3.12.04.8
trusty

released

3.3.8-1ubuntu6.9
trusty/esm

DNE

trusty was released [3.3.8-1ubuntu6.9]
upstream

released

3.5.23-1
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

released

3.5.12-1ubuntu7.3

Показывать по

EPSS

Процентиль: 96%
0.30071
Средний

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
почти 9 лет назад

Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.

CVSS3: 7.5
nvd
почти 9 лет назад

Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.

CVSS3: 7.5
debian
почти 9 лет назад

Incorrect processing of responses to If-None-Modified HTTP conditional ...

CVSS3: 7.5
github
больше 3 лет назад

Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.

oracle-oval
почти 9 лет назад

ELSA-2017-0183: squid34 security update (MODERATE)

EPSS

Процентиль: 96%
0.30071
Средний

5 Medium

CVSS2

7.5 High

CVSS3