Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-2572
HistoryFeb 27, 2016 - 12:00 a.m.

CVE-2016-2572

2016-02-2700:00:00
ubuntu.com
ubuntu.com
10

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.675 Medium

EPSS

Percentile

98.0%

http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a
response-parsing failure, which allows remote HTTP servers to cause a
denial of service (assertion failure and daemon exit) via a malformed
response.

Notes

Author Note
mdeslaur This CVE is only for the ‘Do not use parsing leftovers, such as HTTP response status code’ part of the squid-4-14548.patch patch. As such, it is 4.x only.

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.675 Medium

EPSS

Percentile

98.0%