First published: Mon Jan 29 2018(Updated: )
Apsis Pound before 2.8a allows request smuggling via crafted headers, a different vulnerability than CVE-2005-3751.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =7.0 | |
APSIS Pound | <=2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10711 has a medium severity level due to its potential for request smuggling, which can lead to unauthorized access or data leakage.
To fix CVE-2016-10711, upgrade to APSIS Pound version 2.8a or later, or ensure you are using a Debian version that is not vulnerable.
CVE-2016-10711 affects all versions of APSIS Pound up to 2.7.
Yes, Debian Linux 7.0 is affected by CVE-2016-10711 and users are advised to upgrade to a fixed version.
CVE-2016-10711 enables request smuggling attacks via crafted headers, allowing attackers to manipulate requests between servers.