Package: tntnet
Version: 2.2-3
Severity: important
Tags: security, fixed-upstream

Description: By sending a crafted HTTP request that uses "\n" to end
its headers instead of the expected "\r\n", it is possible that
headers from a previous unrelated request will seemingly be appended
to the crafted request (due to a missing null termination). This
allows a remote attacker to use sensitive headers from other users'
requests in their own requests, such as cookies or HTTP authentication
credentials.
Affected versions: current releases  (<= 2.2)
Fixed in version: 2.2.1
Fix: 
https://github.com/maekitalo/tntnet/commit/9bd3b14042e12d84f39ea9f55731705ba516f525
and 
https://github.com/maekitalo/tntnet/commit/9d1a859e28b78bfbf769689454b529ac7709dee4
Release notes: 
http://www.tntnet.org/download/tntnet-2.2.1/Releasenotes-2.2.1.markdown
Reported by: Matthew Daley
CVE request: http://www.openwall.com/lists/oss-security/2014/01/18/5

---
Henri Salo

Attachment: signature.asc
Description: Digital signature

Reply via email to