OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051620.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051637.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051640.html - | |
References | () http://secunia.com/advisories/42381 - | |
References | () http://www.infradead.org/openconnect.html - | |
References | () http://www.securityfocus.com/bid/44111 - | |
References | () http://www.vupen.com/english/advisories/2010/3078 - |
Information
Published : 2010-10-14 05:58
Updated : 2024-11-21 01:19
NVD link : CVE-2010-3902
Mitre link : CVE-2010-3902
CVE.ORG link : CVE-2010-3902
JSON object : View
Products Affected
infradead
- openconnect
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor