Bug 156711

Summary: CAN-2005-1390 HTTP Request Smuggling Vulnerabilities
Product: [Fedora] Fedora Reporter: Josh Bressers <bressers>
Component: squidAssignee: Jay Fenlason <fenlason>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: medium    
Version: 3CC: jfeeney
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=low,public=20050423,source=cve,reported=20050502
Fixed In Version: 7:2.5.STABLE8-1.FC3.1 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-05-16 18:43:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Josh Bressers 2005-05-03 15:16:17 UTC
+++ This bug was initially created as a clone of Bug #156704 +++

Squid is susceptible to a class of attacks known as "HTTP Request
Smuggling."  These attacks involve sending malformed HTTP requests
that cause Squid and an upstream HTTP agent (origin server or
another proxy) to disagree on the boundary between HTTP requests
on a persistent connection.

http://www3.br.squid-cache.org/Advisories/SQUID-2005_4.txt