First published: Tue Mar 14 2017(Updated: )
Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee VirusScan Enterprise | <=2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8024 is classified as a medium severity vulnerability.
To mitigate CVE-2016-8024, upgrade Intel Security VirusScan Enterprise Linux to version 2.0.4 or later.
CVE-2016-8024 is an HTTP response header injection vulnerability.
CVE-2016-8024 affects users of Intel Security VirusScan Enterprise Linux version 2.0.3 and earlier.
An attacker could exploit CVE-2016-8024 to spoof server responses and potentially gain access to sensitive information.