framework/common/messageheaderparser.cpp in Tntnet before 2.2.1 allows remote attackers to obtain sensitive information via a header that ends in \n instead of \r\n, which prevents a null terminator from being added and causes Tntnet to include headers from other requests.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://secunia.com/advisories/56400 | third party advisory vendor advisory |
https://github.com/maekitalo/tntnet/commit/9bd3b14042e12d84f39ea9f55731705ba516f525 | patch |
http://seclists.org/oss-sec/2014/q1/116 | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127746.html | vendor advisory |
http://seclists.org/oss-sec/2014/q1/112 | mailing list |
http://www.securityfocus.com/bid/65025 | vdb entry |
http://www.tntnet.org/download/tntnet-2.2.1/Releasenotes-2.2.1.markdown | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90565 | vdb entry |