Vulnerability CVE-2010-3902


Published: 2010-10-14   Modified: 2012-02-13

Description:
OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Infradead -> Openconnect 

 References:
http://www.vupen.com/english/advisories/2010/3078
http://www.securityfocus.com/bid/44111
http://www.infradead.org/openconnect.html
http://secunia.com/advisories/42381
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051640.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051637.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051620.html

Copyright 2024, cxsecurity.com

 

Back to Top