High severity7.5NVD Advisory· Published Feb 27, 2016· Updated May 6, 2026
CVE-2016-2572
CVE-2016-2572
Description
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
Affected products
6cpe:2.3:a:squid-cache:squid:4.0.1:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:squid-cache:squid:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:4.0.6:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- www.squid-cache.org/Advisories/SQUID-2016_2.txtnvdVendor Advisory
- www.squid-cache.org/Versions/v4/changesets/squid-4-14548.patchnvdVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.htmlnvd
- lists.opensuse.org/opensuse-updates/2016-08/msg00069.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-2600.htmlnvd
- www.openwall.com/lists/oss-security/2016/02/26/2nvd
- www.securitytracker.com/id/1035101nvd
- security.gentoo.org/glsa/201607-01nvd
News mentions
0No linked articles in our index yet.