First published: Tue Oct 12 2010(Updated: )
OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
infradead OpenConnect | <=2.25 | |
infradead OpenConnect | =1.00 | |
infradead OpenConnect | =1.10 | |
infradead OpenConnect | =1.20 | |
infradead OpenConnect | =1.30 | |
infradead OpenConnect | =2.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3902 has been classified as a medium severity vulnerability due to the potential exposure of sensitive information.
To remediate CVE-2010-3902, update OpenConnect to version 2.26 or later.
CVE-2010-3902 affects OpenConnect versions prior to 2.26, including versions 1.00, 1.10, 1.20, 1.30, and 2.22.
CVE-2010-3902 is a vulnerability that allows for the leakage of sensitive information through debugging output.
Attackers exploiting CVE-2010-3902 can read sensitive cookie values from debugging outputs, potentially compromising user sessions.