CVE-2016-2571

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-2571
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2571.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-2571
Related
Published
2016-02-27T05:59:05Z
Modified
2024-10-12T01:58:11.103431Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.

References

Affected packages

Git / github.com/squid-cache/squid

Affected ranges

Type
GIT
Repo
https://github.com/squid-cache/squid
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected

Affected versions

Other

BASIC_TPROXY4
SQUID_3_0_PRE1
SQUID_3_0_PRE2
SQUID_3_0_PRE3
SQUID_3_0_PRE4
SQUID_3_0_PRE5
SQUID_3_0_PRE6
SQUID_3_0_PRE7
SQUID_3_0_RC1
SQUID_3_0_STABLE1
SQUID_3_0_STABLE10
SQUID_3_0_STABLE11
SQUID_3_0_STABLE11_RC1
SQUID_3_0_STABLE12
SQUID_3_0_STABLE13
SQUID_3_0_STABLE14
SQUID_3_0_STABLE15
SQUID_3_0_STABLE16
SQUID_3_0_STABLE16_RC1
SQUID_3_0_STABLE17
SQUID_3_0_STABLE18
SQUID_3_0_STABLE19
SQUID_3_0_STABLE2
SQUID_3_0_STABLE20
SQUID_3_0_STABLE21
SQUID_3_0_STABLE3
SQUID_3_0_STABLE4
SQUID_3_0_STABLE5
SQUID_3_0_STABLE6
SQUID_3_0_STABLE7
SQUID_3_0_STABLE8
SQUID_3_0_STABLE9
SQUID_3_1_0_1
SQUID_3_1_0_10
SQUID_3_1_0_11
SQUID_3_1_0_12
SQUID_3_1_0_13
SQUID_3_1_0_14
SQUID_3_1_0_2
SQUID_3_1_0_3
SQUID_3_1_0_4
SQUID_3_1_0_5
SQUID_3_1_0_6
SQUID_3_1_0_7
SQUID_3_1_0_8
SQUID_3_1_0_9
SQUID_3_2_0_1
SQUID_3_3_0_1
SQUID_3_3_0_2
SQUID_3_3_0_3
SQUID_3_3_1
SQUID_3_3_2
SQUID_3_3_3
SQUID_3_3_4
SQUID_3_4_0_1
SQUID_3_4_0_2
SQUID_3_4_0_3
SQUID_3_4_1
SQUID_3_4_2
SQUID_3_4_3
SQUID_3_4_4
SQUID_3_5_0_1
SQUID_3_5_0_2
SQUID_4_0_1
for-libecap-v0p1
merge-candidate-3-v1
merge-candidate-3-v2
sourceformat-review-1
take00
take01
take02
take03
take04
take06
take07
take08
take09
take1
take2

BumpSslServerFirst.*

BumpSslServerFirst.take01
BumpSslServerFirst.take02
BumpSslServerFirst.take03
BumpSslServerFirst.take04
BumpSslServerFirst.take05
BumpSslServerFirst.take06
BumpSslServerFirst.take07
BumpSslServerFirst.take08
BumpSslServerFirst.take09
BumpSslServerFirst.take10