First published: Tue Aug 09 2011(Updated: )
The Mobility Pack before 1.2 in Novell Data Synchronizer 1.x through 1.1.2 build 428 does not properly restrict caching of HTTPS responses, which makes it easier for remote attackers to obtain sensitive information by leveraging an unattended workstation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Mobility Pack | =1.1 | |
Novell Data Synchronizer | =1.1.2 | |
Novell Data Synchronizer | =1.1.0 | |
Novell Data Synchronizer | =1.1.1 | |
Novell Mobility Pack | =1.1.2 | |
Novell Data Synchronizer | =1.0.0 | |
Novell Mobility Pack | =1.0 | |
Novell Mobility Pack | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3014 is classified as a medium severity vulnerability due to the potential for sensitive information disclosure.
To mitigate CVE-2011-3014, update to a later version of the Novell Mobility Pack or Novell Data Synchronizer that addresses this vulnerability.
CVE-2011-3014 affects Novell Mobility Pack 1.0 to 1.2 and Novell Data Synchronizer versions 1.0.0 to 1.1.2.
Attackers can exploit CVE-2011-3014 by obtaining sensitive information from improperly cached HTTPS responses on unattended workstations.
Yes, an attacker must have physical or remote access to an unattended workstation to exploit CVE-2011-3014.