The remote host is missing an update for the 'squid34' package(s) announced via the referenced advisory. It was found that squid did not properly remove connection specific headers when answering conditional requests using a cached request. A remote attacker could send a specially crafted request to an HTTP server via the squid proxy and steal private data from other connections
Reporter | Title | Published | Views | Family All 66 |
---|---|---|---|---|
![]() | EulerOS 2.0 SP2 : squid (EulerOS-SA-2017-1018) | 1 May 201700:00 | – | nessus |
![]() | RHEL 7 : squid (RHSA-2017:0182) | 25 Jan 201700:00 | – | nessus |
![]() | Scientific Linux Security Update : squid34 on SL6.x i386/x86_64 (20170124) | 25 Jan 201700:00 | – | nessus |
![]() | CentOS 6 : squid34 (CESA-2017:0183) | 27 Jan 201700:00 | – | nessus |
![]() | Oracle Linux 7 : squid (ELSA-2017-0182) | 25 Jan 201700:00 | – | nessus |
![]() | Scientific Linux Security Update : squid on SL7.x x86_64 (20170124) | 25 Jan 201700:00 | – | nessus |
![]() | Virtuozzo 6 : squid34 (VZLSA-2017-0183) | 13 Jul 201700:00 | – | nessus |
![]() | Oracle Linux 6 : squid34 (ELSA-2017-0183) | 25 Jan 201700:00 | – | nessus |
![]() | Squid 3.1 < 3.x < 3.5.23 / 4.x < 4.0.17 Information Disclosure Vulnerability (SQUID-2016:11) | 17 Dec 201800:00 | – | nessus |
![]() | Debian DLA-763-1 : squid3 security update | 27 Dec 201600:00 | – | nessus |
Source | Link |
---|---|
redhat | www.redhat.com/archives/rhsa-announce/2017-January/msg00041.html |
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.871751");
script_version("2024-03-21T05:06:54+0000");
script_tag(name:"last_modification", value:"2024-03-21 05:06:54 +0000 (Thu, 21 Mar 2024)");
script_tag(name:"creation_date", value:"2017-01-25 05:41:59 +0100 (Wed, 25 Jan 2017)");
script_cve_id("CVE-2016-10002");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2018-01-05 02:30:00 +0000 (Fri, 05 Jan 2018)");
script_tag(name:"qod_type", value:"package");
script_name("RedHat Update for squid34 RHSA-2017:0183-01");
script_tag(name:"summary", value:"The remote host is missing an update for the 'squid34'
package(s) announced via the referenced advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The squid34 packages provide version 3.4
of Squid, a high-performance proxy caching server for web clients, supporting FTP,
Gopher, and HTTP data objects.
Security Fix(es):
* It was found that squid did not properly remove connection specific
headers when answering conditional requests using a cached request. A
remote attacker could send a specially crafted request to an HTTP server
via the squid proxy and steal private data from other connections.
(CVE-2016-10002)");
script_tag(name:"affected", value:"squid34 on
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_xref(name:"RHSA", value:"2017:0183-01");
script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2017-January/msg00041.html");
script_tag(name:"solution_type", value:"VendorFix");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone AG");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_6");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release) exit(0);
res = "";
if(release == "RHENT_6")
{
if ((res = isrpmvuln(pkg:"squid34", rpm:"squid34~3.4.14~9.el6_8.4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"squid34-debuginfo", rpm:"squid34-debuginfo~3.4.14~9.el6_8.4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo