mime_header.cc in Squid before 3.5.18 allows remote attackers to bypass intended same-origin restrictions and possibly conduct cache-poisoning attacks via a crafted HTTP Host header, aka a header smuggling issue.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux | Oracle | 6 (including) | 6 (including) |
Linux | Oracle | 7 (including) | 7 (including) |
Red Hat Enterprise Linux 6 | RedHat | squid-7:3.1.23-16.el6_8.4 | * |
Red Hat Enterprise Linux 6 | RedHat | squid34-7:3.4.14-9.el6_8.3 | * |
Red Hat Enterprise Linux 7 | RedHat | squid-7:3.3.8-26.el7_2.3 | * |
Squid3 | Ubuntu | devel | * |
Squid3 | Ubuntu | precise | * |
Squid3 | Ubuntu | trusty | * |
Squid3 | Ubuntu | upstream | * |
Squid3 | Ubuntu | wily | * |
Squid3 | Ubuntu | xenial | * |