Bug 156704 - CAN-2005-1390 HTTP Request Smuggling Vulnerabilities
Summary: CAN-2005-1390 HTTP Request Smuggling Vulnerabilities
Status: CLOSED DUPLICATE of bug 146161
Alias: None
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: squid   
(Show other bugs)
Version: 4.0
Hardware: All
OS: Linux
medium
low
Target Milestone: ---
: ---
Assignee: Jay Fenlason
QA Contact:
URL:
Whiteboard: impact=low,public=20050423,source=cve...
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2005-05-03 14:59 UTC by Josh Bressers
Modified: 2014-08-31 23:27 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-05-06 15:35:34 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

Description Josh Bressers 2005-05-03 14:59:42 UTC
Squid is susceptible to a class of attacks known as "HTTP Request
Smuggling."  These attacks involve sending malformed HTTP requests
that cause Squid and an upstream HTTP agent (origin server or
another proxy) to disagree on the boundary between HTTP requests
on a persistent connection.

http://www3.br.squid-cache.org/Advisories/SQUID-2005_4.txt

Comment 1 Josh Bressers 2005-05-03 15:03:55 UTC
This issue should also affect RHEL2.1 and RHEL3

Comment 2 Josh Bressers 2005-05-06 15:35:34 UTC

*** This bug has been marked as a duplicate of 146161 ***


Note You need to log in before you can comment on or make changes to this bug.