Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.806518
Category:Web Servers
Title:Squid 'cache_peer' Security Bypass Vulnerability (SQUID-2015:2)
Summary:Squid is prone to an access bypass vulnerability.
Description:Summary:
Squid is prone to an access bypass vulnerability.

Vulnerability Insight:
The flaw is due to improper handling of
CONNECT method peer responses when configured with cache_peer.

Vulnerability Impact:
Successful exploitation will allow remote
attackers to bypass security in an explicit gateway proxy.

Affected Software/OS:
Squid version 3.5.5 and prior.

Solution:
Update to version 3.5.6 or later.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-5400
BugTraq ID: 75553
http://www.securityfocus.com/bid/75553
Debian Security Information: DSA-3327 (Google Search)
http://www.debian.org/security/2015/dsa-3327
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183598.html
http://www.openwall.com/lists/oss-security/2015/07/06/8
http://www.openwall.com/lists/oss-security/2015/07/09/12
http://www.openwall.com/lists/oss-security/2015/07/10/2
http://www.openwall.com/lists/oss-security/2015/07/17/14
http://www.securitytracker.com/id/1032873
SuSE Security Announcement: SUSE-SU-2016:1996 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
SuSE Security Announcement: SUSE-SU-2016:2089 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
SuSE Security Announcement: openSUSE-SU-2016:2081 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.