Описание
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.3.8-1ubuntu17 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.3.8-1ubuntu6.4]] |
precise | not-affected | 3.1.19-1ubuntu3.12.04.4 |
trusty | not-affected | 3.3.8-1ubuntu6.4 |
trusty/esm | DNE | trusty was not-affected [3.3.8-1ubuntu6.4] |
upstream | released | 3.5.15, 4.0.7 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
wily | not-affected | 3.3.8-1ubuntu16 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after ...
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
Уязвимость прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5 Medium
CVSS2
7.5 High
CVSS3