6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.009 Low
EPSS
Percentile
82.8%
Package : squid3
Version : 3.1.6-1.2+squeeze5
CVE ID : CVE-2015-5400
Debian Bug : 793128
Alex Rousskov discovered that Squid configured with cache_peer and
operating on explicit proxy traffic does not correctly handle CONNECT
method peer responses. In some configurations, it allows remote clients to
bypass security in an explicit gateway proxy.
For Debian 6 Squeeze, this problem has been fixed in squid3 version
3.1.6-1.2+squeeze5. We recommend that you upgrade your squid3 packages.
β
RaphaΓ«l Hertzog β Debian Developer
Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/
Attachment:
signature.asc
Description: Digital signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 6 | amd64 | squidclient | <Β 3.1.6-1.2+squeeze5 | squidclient_3.1.6-1.2+squeeze5_amd64.deb |
Debian | 7 | sparc | squid3-dbg | <Β 3.1.20-2.2+deb7u3 | squid3-dbg_3.1.20-2.2+deb7u3_sparc.deb |
Debian | 8 | i386 | squid-cgi | <Β 3.4.8-6+deb8u1 | squid-cgi_3.4.8-6+deb8u1_i386.deb |
Debian | 8 | powerpc | squidclient | <Β 3.4.8-6+deb8u1 | squidclient_3.4.8-6+deb8u1_powerpc.deb |
Debian | 8 | kfreebsd-i386 | squid3-dbg | <Β 3.4.8-6+deb8u1 | squid3-dbg_3.4.8-6+deb8u1_kfreebsd-i386.deb |
Debian | 7 | amd64 | squid3-dbg | <Β 3.1.20-2.2+deb7u3 | squid3-dbg_3.1.20-2.2+deb7u3_amd64.deb |
Debian | 8 | mipsel | squid-purge | <Β 3.4.8-6+deb8u1 | squid-purge_3.4.8-6+deb8u1_mipsel.deb |
Debian | 7 | armel | squid3-dbg | <Β 3.1.20-2.2+deb7u3 | squid3-dbg_3.1.20-2.2+deb7u3_armel.deb |
Debian | 8 | kfreebsd-amd64 | squidclient | <Β 3.4.8-6+deb8u1 | squidclient_3.4.8-6+deb8u1_kfreebsd-amd64.deb |
Debian | 7 | kfreebsd-i386 | squidclient | <Β 3.1.20-2.2+deb7u3 | squidclient_3.1.20-2.2+deb7u3_kfreebsd-i386.deb |