CVE-2016-4053
Publication date 25 April 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.
Status
Package | Ubuntu Release | Status |
---|---|---|
squid3 | 16.04 LTS xenial |
Fixed 3.5.12-1ubuntu7.2
|
14.04 LTS trusty |
Fixed 3.3.8-1ubuntu6.8
|
|
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score | 3.7 · Low |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-2995-1
- Squid vulnerabilities
- 9 June 2016