An input validation flaw was found in Squid's mime_get_header_field() function, which is used to search for headers within HTTP requests. An attacker could send an HTTP request from the client side with specially crafted header Host header that bypasses same-origin security protections, causing Squid operating as interception or reverse-proxy to contact the wrong origin server. It could also be used for cache poisoning for client not following RFC 7230.
Find out more about CVE-2016-4554 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 4 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:N/I:P/A:P |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (squid) | RHSA-2016:1138 | 2016-05-31 |
Red Hat Enterprise Linux 6 (squid34) | RHSA-2016:1140 | 2016-05-31 |
Red Hat Enterprise Linux 7 (squid) | RHSA-2016:1139 | 2016-05-31 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | squid | Will not fix |