CVE-2016-4553

Published on: 05/10/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:26:58 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:

client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.

  • CVE-2016-4553 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.6 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED NONE HIGH NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
[security-announce] SUSE-SU-2016:2089-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:2089
No Description Provided Vendor Advisory
bugs.squid-cache.org
text/html
URL Logo CONFIRM bugs.squid-cache.org/show_bug.cgi?id=4501
Debian -- Security Information -- DSA-3625-1 squid3 www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3625
Squid Host Header Processing Lets Remote Users Bypass Security and Poison the Proxy Cache - SecurityTracker Third Party Advisory
www.securitytracker.com
text/html
URL Logo SECTRACK 1035768
www.squid-cache.org
text/x-diff
URL Logo CONFIRM www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14039.patch
USN-2995-1: Squid vulnerabilities | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-2995-1
Vendor Advisory
www.squid-cache.org
text/plain
URL Logo CONFIRM www.squid-cache.org/Advisories/SQUID-2016_7.txt
[security-announce] SUSE-SU-2016:1996-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1996
Oracle Linux Bulletin - April 2016 Third Party Advisory
www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2016:1140
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2016:1139
Squid: Multiple vulnerabilities (GLSA 201607-01) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201607-01
openSUSE-SU-2016:2081-1: moderate: Security update for squid lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:2081

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux15.10AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux15.10AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
OracleLinux7AllAllAll
Operating
System
OracleLinux7AllAllAll
ApplicationSquid-cacheSquid4.0.1AllAllAll
ApplicationSquid-cacheSquid4.0.2AllAllAll
ApplicationSquid-cacheSquid4.0.3AllAllAll
ApplicationSquid-cacheSquid4.0.4AllAllAll
ApplicationSquid-cacheSquid4.0.5AllAllAll
ApplicationSquid-cacheSquid4.0.6AllAllAll
ApplicationSquid-cacheSquid4.0.7AllAllAll
ApplicationSquid-cacheSquid4.0.8AllAllAll
ApplicationSquid-cacheSquid4.0.9AllAllAll
ApplicationSquid-cacheSquid4.0.1AllAllAll
ApplicationSquid-cacheSquid4.0.2AllAllAll
ApplicationSquid-cacheSquid4.0.3AllAllAll
ApplicationSquid-cacheSquid4.0.4AllAllAll
ApplicationSquid-cacheSquid4.0.5AllAllAll
ApplicationSquid-cacheSquid4.0.6AllAllAll
ApplicationSquid-cacheSquid4.0.7AllAllAll
ApplicationSquid-cacheSquid4.0.8AllAllAll
ApplicationSquid-cacheSquid4.0.9AllAllAll
ApplicationSquid-cacheSquidAllAllAllAll
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:4.0.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*: