Lucene search

K
debianDebianDEBIAN:DLA-286-1:B9F1A
HistoryJul 30, 2015 - 8:53 a.m.

[SECURITY] [DLA 286-1] squid3 security update

2015-07-3008:53:00
lists.debian.org
8

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.8%

Package : squid3
Version : 3.1.6-1.2+squeeze5
CVE ID : CVE-2015-5400
Debian Bug : 793128

Alex Rousskov discovered that Squid configured with cache_peer and
operating on explicit proxy traffic does not correctly handle CONNECT
method peer responses. In some configurations, it allows remote clients to
bypass security in an explicit gateway proxy.

For Debian 6 Squeeze, this problem has been fixed in squid3 version
3.1.6-1.2+squeeze5. We recommend that you upgrade your squid3 packages.

–
RaphaΓ«l Hertzog β—ˆ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/
Attachment:
signature.asc
Description: Digital signature

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.8%