UBUNTU-CVE-2016-5386

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2016-5386
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-5386.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-5386
Related
Published
2016-07-18T14:00:00Z
Modified
2016-07-18T14:00:00Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

References

Affected packages

Ubuntu:Pro:16.04:LTS / golang-1.6

Package

Name
golang-1.6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.6-0ubuntu1
1.6-0ubuntu2
1.6-0ubuntu3
1.6-0ubuntu4
1.6-0ubuntu5
1.6.1-0ubuntu1
1.6.2-0ubuntu5~16.04
1.6.2-0ubuntu5~16.04.2
1.6.2-0ubuntu5~16.04.3
1.6.2-0ubuntu5~16.04.4

Ecosystem specific

{
    "ubuntu_priority": "low"
}