Novell Access Manager 3 SP4 does not properly expire X.509 certificate sessions, which allows physically proximate attackers to obtain a logged-in session by using a victim's web-browser process that continues to send the original and valid SSL sessionID, related to inability of Apache Tomcat to clear entries from its SSL cache.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://osvdb.org/49737 | vdb entry |
http://secunia.com/advisories/32554 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/32121 | vdb entry |
http://www.novell.com/support/viewContent.do?externalId=7001788 | |
http://www.vupen.com/english/advisories/2008/3012 | vdb entry vendor advisory |