Squid input validation vulnerability


Squid contains a vulnerability where inputs are not properly validated.

Squid is a caching proxy server. Squid contains a vulnerability where server responses that contain invalid values in the Content-Length of the HTTP header are sent to the client.

Kazuho Oku reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None

Affected Products

  • Squid versions prior to 3.1.1-STABLE

According to the developer, this vulnerability was addressed in and that all stable Squid versions 3.1.x and later are not affected by this vulnerability.

If a HTTP response with a specially crafted header is processed, it may result in a HTTP response splitting attack.

[Apply an Update]
Apply the appropriate update for the version of the software being used.
Vendor Information

CWE (What is CWE?)

  1. Improper Input Validation(CWE-20) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2015-0881

  1. JVN : JVN#64455813
  2. National Vulnerability Database (NVD) : CVE-2015-0881
Revision History

  Web page was published
  References : Content was added
  Title was modified
  Overview was modified
  Affected Products : Product version was modified
  Solution was modified
  Vendor Information : Content was added