vulnerability

Oracle Linux: CVE-2016-10002: ELSA-2017-0183: squid34 security update (MODERATE) (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Dec 16, 2016
Added
Jan 24, 2017
Modified
Jan 7, 2025

Description

Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.
It was found that squid did not properly remove connection specific headers when answering conditional requests using a cached request. A remote attacker could send a specially crafted request to an HTTP server via the squid proxy and steal private data from other connections.

Solution(s)

oracle-linux-upgrade-squidoracle-linux-upgrade-squid34oracle-linux-upgrade-squid-migration-scriptoracle-linux-upgrade-squid-sysvinit
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.