Upstream information

CVE-2016-2572 at MITRE

Description

http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.

SUSE information

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.96
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Access Vector Network
Access Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
SUSE Bugzilla entries: 968394 [RESOLVED / FIXED], 968395 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11 SP4
  • squid3 >= 3.1.23-8.16.30.1
Patchnames:
slessp4-squid3-12701
SUSE Linux Enterprise Server 12 SP1
  • squid >= 3.3.14-20.2
Patchnames:
SUSE-SLE-SERVER-12-SP1-2016-1184
SUSE Linux Enterprise Server 12 SP2
  • squid >= 3.5.21-23.4
Patchnames:
SUSE Linux Enterprise Server 12 SP2 GA squid
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • squid >= 3.5.21-23.4
Patchnames:
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 GA squid
openSUSE Leap 42.1
  • squid >= 3.3.14-6.1
  • squid-debuginfo >= 3.3.14-6.1
  • squid-debugsource >= 3.3.14-6.1
Patchnames:
openSUSE-2016-988
openSUSE Leap 42.2
  • squid >= 3.5.21-1.6
Patchnames:
openSUSE Leap 42.2 GA squid