CVE-2010-3902
Published: 14 October 2010
OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.
Priority
Status
Package | Release | Status |
---|---|---|
openconnect Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Does not exist
|
|
jaunty |
Does not exist
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Ignored
(end of life)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Not vulnerable
(3.02-1)
|
|
precise |
Not vulnerable
(3.02-1)
|
|
quantal |
Not vulnerable
(3.02-1)
|
|
raring |
Not vulnerable
(3.02-1)
|
|
saucy |
Not vulnerable
(3.02-1)
|
|
upstream |
Released
(2.26)
|