Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2015-5400

Published: 28 September 2015

Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.

Notes

AuthorNote
mdeslaur
non-default configuration, and needs substantial backporting
There are no current plans to fix this CVE in Ubuntu 12.04 LTS
and Ubuntu 14.04 LTS.

Priority

Low

Status

Package Release Status
squid3
Launchpad, Ubuntu, Debian
precise Ignored

trusty Does not exist
(trusty was ignored)
upstream
Released (3.5.6-1)
utopic Ignored
(end of life)
vivid Ignored
(end of life)
wily Ignored
(end of life)
xenial
Released (3.5.12-1ubuntu6)
Patches:
upstream: http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10494.patch
upstream: http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13225.patch