HTTP authentication implementation in Geo++ GNCASTER 1.4.0.7 and earlier allows remote attackers to read authentication headers of other users via a large request with an incorrect authentication attempt, which includes sensitive memory in the response. NOTE: this is referred to as a "memory leak" by some sources, but is better characterized as "memory disclosure."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/62015 - | |
References | () http://secunia.com/advisories/38323 - Vendor Advisory | |
References | () http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-faulty-implementation-of-http-digest-authentication - Exploit | |
References | () http://www.securityfocus.com/archive/1/509199/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/55978 - |
Information
Published : 2010-02-04 20:15
Updated : 2024-11-21 01:12
NVD link : CVE-2010-0551
Mitre link : CVE-2010-0551
CVE.ORG link : CVE-2010-0551
JSON object : View
Products Affected
geopp
- geo\+\+_gncaster
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor