Description in Squid before 3.5.18 allows remote attackers to bypass intended same-origin restrictions and possibly conduct cache-poisoning attacks via a crafted HTTP Host header, aka a "header smuggling" issue.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
devel squid3 3.5.12-1ubuntu8
precise squid3 3.1.19-1ubuntu3.12.04.7
trusty squid3 3.3.8-1ubuntu6.8
upstream squid3 3.5.18
wily squid3 3.3.8-1ubuntu16.3
xenial squid3 3.5.12-1ubuntu7.2


Release Package Reason
vivid/ubuntu-core squid3 DNE
vivid/stable-phone-overlay squid3 DNE