OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051637.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051640.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051620.html | vendor advisory |
http://www.vupen.com/english/advisories/2010/3078 | vdb entry |
http://www.securityfocus.com/bid/44111 | vdb entry |
http://www.infradead.org/openconnect.html | |
http://secunia.com/advisories/42381 | third party advisory |