DEBIAN-CVE-2016-1000107

Source
https://security-tracker.debian.org/tracker/CVE-2016-1000107
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2016-1000107.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2016-1000107
Upstream
Published
2019-12-10T18:15:09.140Z
Modified
2026-03-14T15:06:11.481253Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

References

Affected packages

Debian:11 / erlang

Package

Name
erlang
Purl
pkg:deb/debian/erlang?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:23.*
1:23.2.6+dfsg-1
1:23.2.6+dfsg-1+deb11u1
1:23.2.6+dfsg-1+deb11u2
1:23.2.6+dfsg-1+deb11u3
1:24.*
1:24.0~rc1+dfsg-1
1:24.0~rc2+dfsg-1
1:24.0~rc3+dfsg-1
1:24.0.2+dfsg-1
1:24.0.3+dfsg-1
1:24.0.4+dfsg-1
1:24.0.5+dfsg-1
1:24.0.5+dfsg-2
1:24.0.6+dfsg-1
1:24.0.6+dfsg-2
1:24.1+dfsg-1
1:24.1.1+dfsg-1
1:24.1.4+dfsg-1
1:24.1.5+dfsg-1
1:24.1.7+dfsg-1
1:24.2+dfsg-1
1:24.2.1+dfsg-1
1:24.2.2+dfsg-1
1:24.3+dfsg-1
1:24.3.1+dfsg-1
1:24.3.2+dfsg-1
1:24.3.3+dfsg-1
1:24.3.4+dfsg-1
1:24.3.4.1+dfsg-1
1:24.3.4.5+dfsg-1
1:25.*
1:25.0~rc1+dfsg-1
1:25.0~rc2+dfsg-1
1:25.0~rc3+dfsg-1
1:25.0+dfsg-1
1:25.0.2+dfsg-1
1:25.0.3+dfsg-1
1:25.0.4+dfsg-1
1:25.1.1+dfsg-1
1:25.1.2+dfsg-1
1:25.2+dfsg-1
1:25.2.1+dfsg-1
1:25.2.1+dfsg-2
1:25.2.2+dfsg-1
1:25.2.3+dfsg-1
1:25.3.2.8+dfsg-1
1:25.3.2.10+dfsg-1
1:25.3.2.10+dfsg-2
1:25.3.2.11+dfsg-1
1:25.3.2.12+dfsg-1
1:25.3.2.12+dfsg-2
1:25.3.2.12+dfsg-3
1:26.*
1:26.0~rc2+dfsg-1
1:26.0~rc3+dfsg-1
1:26.0+dfsg-1
1:26.0.1+dfsg-1
1:26.0.2+dfsg-1
1:26.1.2+dfsg-1
1:26.2.1+dfsg-1
1:26.2.4+dfsg-1
1:27.*
1:27.0~rc3+dfsg-1
1:27.0~rc3+dfsg-2
1:27.0~rc3+dfsg-3
1:27.0~rc3+dfsg-4
1:27.0+dfsg-1
1:27.0.1+dfsg-1
1:27.0.1+dfsg-2
1:27.0.1+dfsg-3
1:27.1.2+dfsg-1
1:27.2+dfsg-1
1:27.2+dfsg-2
1:27.2+dfsg-3~exp1
1:27.2.1+dfsg-1
1:27.2.1+dfsg-2
1:27.2.2+dfsg-1
1:27.2.3+dfsg-1
1:27.2.4+dfsg-1
1:27.3+dfsg-1
1:27.3.1+dfsg-1
1:27.3.2+dfsg-1
1:27.3.3+dfsg-1
1:27.3.4+dfsg-1
1:27.3.4.1+dfsg-1
1:27.3.4.3+dfsg-1
1:27.3.4.4+dfsg-1
1:27.3.4.6+dfsg-1
1:27.3.4.8+dfsg-1
1:28.*
1:28.0+dfsg-1
1:28.0.1+dfsg-1
1:28.0.2+dfsg-1
1:28.0.4+dfsg-1
1:28.1.1+dfsg-1
1:28.2+dfsg-1
1:28.3+dfsg-1
1:28.3.1+dfsg-1
1:29.*
1:29.0~rc1+dfsg-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2016-1000107.json"

Debian:12 / erlang

Package

Name
erlang
Purl
pkg:deb/debian/erlang?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:25.*
1:25.2.3+dfsg-1
1:25.2.3+dfsg-1+deb12u1
1:25.2.3+dfsg-1+deb12u2
1:25.2.3+dfsg-1+deb12u3
1:25.3.2.8+dfsg-1
1:25.3.2.10+dfsg-1
1:25.3.2.10+dfsg-2
1:25.3.2.11+dfsg-1
1:25.3.2.12+dfsg-1
1:25.3.2.12+dfsg-2
1:25.3.2.12+dfsg-3
1:26.*
1:26.0~rc2+dfsg-1
1:26.0~rc3+dfsg-1
1:26.0+dfsg-1
1:26.0.1+dfsg-1
1:26.0.2+dfsg-1
1:26.1.2+dfsg-1
1:26.2.1+dfsg-1
1:26.2.4+dfsg-1
1:27.*
1:27.0~rc3+dfsg-1
1:27.0~rc3+dfsg-2
1:27.0~rc3+dfsg-3
1:27.0~rc3+dfsg-4
1:27.0+dfsg-1
1:27.0.1+dfsg-1
1:27.0.1+dfsg-2
1:27.0.1+dfsg-3
1:27.1.2+dfsg-1
1:27.2+dfsg-1
1:27.2+dfsg-2
1:27.2+dfsg-3~exp1
1:27.2.1+dfsg-1
1:27.2.1+dfsg-2
1:27.2.2+dfsg-1
1:27.2.3+dfsg-1
1:27.2.4+dfsg-1
1:27.3+dfsg-1
1:27.3.1+dfsg-1
1:27.3.2+dfsg-1
1:27.3.3+dfsg-1
1:27.3.4+dfsg-1
1:27.3.4.1+dfsg-1
1:27.3.4.3+dfsg-1
1:27.3.4.4+dfsg-1
1:27.3.4.6+dfsg-1
1:27.3.4.8+dfsg-1
1:28.*
1:28.0+dfsg-1
1:28.0.1+dfsg-1
1:28.0.2+dfsg-1
1:28.0.4+dfsg-1
1:28.1.1+dfsg-1
1:28.2+dfsg-1
1:28.3+dfsg-1
1:28.3.1+dfsg-1
1:29.*
1:29.0~rc1+dfsg-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2016-1000107.json"

Debian:13 / erlang

Package

Name
erlang
Purl
pkg:deb/debian/erlang?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:27.3.4.1+dfsg-1+deb13u1

Affected versions

1:27.*
1:27.3.4.1+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2016-1000107.json"

Debian:14 / erlang

Package

Name
erlang
Purl
pkg:deb/debian/erlang?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:27.3.4.3+dfsg-1

Affected versions

1:27.*
1:27.3.4.1+dfsg-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2016-1000107.json"