Pound: HTTP request smuggling Pound is vulnerable to HTTP request smuggling, which could be exploited to bypass security restrictions or poison web caches. pound 2006-06-07 2006-11-24 118541 remote 2.0.5 1.10 1.9.4 2.0.5

Pound is a reverse proxy, load balancer and HTTPS front-end. It allows to distribute the load on several web servers and offers a SSL wrapper for web servers that do not support SSL directly.

Pound fails to handle HTTP requests with conflicting "Content-Length" and "Transfer-Encoding" headers correctly.

An attacker could exploit this vulnerability by sending HTTP requests with specially crafted "Content-Length" and "Transfer-Encoding" headers to bypass certain security restrictions or to poison the web proxy cache.

There is no known workaround at this time.

All Pound users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose www-servers/pound
CVE-2005-3751 DerCorny koon DerCorny