CVE-2016-2571

Source
https://cve.org/CVERecord?id=CVE-2016-2571
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2571.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-2571
Downstream
Related
Published
2016-02-27T05:59:05.797Z
Modified
2026-02-17T06:58:21.155619Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.

References

Affected packages

Git / github.com/squid-cache/squid

Affected ranges

Type
GIT
Repo
https://github.com/squid-cache/squid
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other
HISTORIC_RELEASES
SQUID_3_0_PRE1
SQUID_3_0_PRE2
SQUID_3_0_PRE3
SQUID_3_0_PRE4
SQUID_3_0_PRE5
SQUID_3_0_PRE6
SQUID_3_0_PRE7
SQUID_3_0_RC1
SQUID_3_0_STABLE1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2571.json"