OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.
CPE | Name | Operator | Version |
---|---|---|---|
openconnect | eq | 2.22 | |
openconnect | eq | 1.00 | |
openconnect | eq | 1.30 | |
openconnect | eq | 1.10 | |
openconnect | le | 2.25 | |
openconnect | eq | 1.20 |
secunia.com/advisories/42381
www.infradead.org/openconnect.html
www.securityfocus.com/bid/44111
www.vupen.com/english/advisories/2010/3078
lists.fedoraproject.org/pipermail/package-announce/2010-November/051620.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/051637.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/051640.html