Upstream information

CVE-2016-4554 at MITRE

Description

mime_header.cc in Squid before 3.5.18 allows remote attackers to bypass intended same-origin restrictions and possibly conduct cache-poisoning attacks via a crafted HTTP Host header, aka a "header smuggling" issue.

SUSE information

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 4.96 4.93
Vector AV:N/AC:L/Au:N/C:N/I:P/A:N AV:N/AC:M/Au:S/C:P/I:N/A:P
Access Vector Network Network
Access Complexity Low Medium
Authentication None Single
Confidentiality Impact None Partial
Integrity Impact Partial None
Availability Impact None Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 8.6
Vector AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
Access Vector Network
Access Complexity Low
Privileges Required None
User Interaction None
Scope Changed
Confidentiality Impact None
Integrity Impact High
Availability Impact None

This issue is currently rated as having moderate severity.

SUSE Bugzilla entries: 979010 [REOPENED], 990451 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11 SP4
  • squid >= 2.7.STABLE5-2.12.29.1
  • squid3 >= 3.1.23-8.16.30.1
Patchnames:
slessp4-squid-12707
slessp4-squid3-12701
SUSE Linux Enterprise Server 12 SP1
  • squid >= 3.3.14-20.2
Patchnames:
SUSE-SLE-SERVER-12-SP1-2016-1184
SUSE Linux Enterprise Server 12 SP2
  • squid >= 3.5.21-23.4
Patchnames:
SUSE Linux Enterprise Server 12 SP2 GA squid
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • squid >= 3.5.21-23.4
Patchnames:
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 GA squid
openSUSE Leap 42.1
  • squid >= 3.3.14-6.1
  • squid-debuginfo >= 3.3.14-6.1
  • squid-debugsource >= 3.3.14-6.1
Patchnames:
openSUSE-2016-988
openSUSE Leap 42.2
  • squid >= 3.5.21-1.6
Patchnames:
openSUSE Leap 42.2 GA squid