CRLF injection vulnerability in Bugzilla before 3.2.9, 3.4.x before 3.4.9, 3.6.x before 3.6.3, and 4.0.x before 4.0rc1, when Server Push is enabled in a web browser, allows remote attackers to inject arbitrary HTTP headers and content, and conduct HTTP response splitting attacks, via a crafted URL.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html | vendor advisory |
http://www.vupen.com/english/advisories/2010/2878 | vdb entry vendor advisory |
http://www.bugzilla.org/security/3.2.8/ | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html | vendor advisory |
http://www.securitytracker.com/id?1024683 | vdb entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=600464 | |
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html | vendor advisory |
http://www.vupen.com/english/advisories/2010/2975 | vdb entry vendor advisory |
http://secunia.com/advisories/42271 | third party advisory vendor advisory |