CVE-2010-3902

OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:infradead:openconnect:*:*:*:*:*:*:*:*
cpe:2.3:a:infradead:openconnect:1.00:*:*:*:*:*:*:*
cpe:2.3:a:infradead:openconnect:1.10:*:*:*:*:*:*:*
cpe:2.3:a:infradead:openconnect:1.20:*:*:*:*:*:*:*
cpe:2.3:a:infradead:openconnect:1.30:*:*:*:*:*:*:*
cpe:2.3:a:infradead:openconnect:2.22:*:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051620.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051620.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051637.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051637.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051640.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051640.html -
References () http://secunia.com/advisories/42381 - () http://secunia.com/advisories/42381 -
References () http://www.infradead.org/openconnect.html - () http://www.infradead.org/openconnect.html -
References () http://www.securityfocus.com/bid/44111 - () http://www.securityfocus.com/bid/44111 -
References () http://www.vupen.com/english/advisories/2010/3078 - () http://www.vupen.com/english/advisories/2010/3078 -

Information

Published : 2010-10-14 05:58

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3902

Mitre link : CVE-2010-3902

CVE.ORG link : CVE-2010-3902


JSON object : View

Products Affected

infradead

  • openconnect
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor