Squid 3.x before 3.5.16 and 4.x before 4.0.8 improperly perform bounds checking, which allows remote attackers to cause a denial of service via a crafted HTTP response, related to Vary headers.
{ "binaries": [ { "binary_name": "squid", "binary_version": "3.5.12-1ubuntu7.5" }, { "binary_name": "squid-cgi", "binary_version": "3.5.12-1ubuntu7.5" }, { "binary_name": "squid-cgi-dbgsym", "binary_version": "3.5.12-1ubuntu7.5" }, { "binary_name": "squid-common", "binary_version": "3.5.12-1ubuntu7.5" }, { "binary_name": "squid-dbg", "binary_version": "3.5.12-1ubuntu7.5" }, { "binary_name": "squid-dbgsym", "binary_version": "3.5.12-1ubuntu7.5" }, { "binary_name": "squid-purge", "binary_version": "3.5.12-1ubuntu7.5" }, { "binary_name": "squid-purge-dbgsym", "binary_version": "3.5.12-1ubuntu7.5" }, { "binary_name": "squid3", "binary_version": "3.5.12-1ubuntu7.5" }, { "binary_name": "squidclient", "binary_version": "3.5.12-1ubuntu7.5" }, { "binary_name": "squidclient-dbgsym", "binary_version": "3.5.12-1ubuntu7.5" } ], "availability": "No subscription required" }