CVE-2016-8024
Summary
| CVE | CVE-2016-8024 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-03-14 22:59:00 UTC |
| Updated | 2017-09-03 01:29:00 UTC |
| Description | Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing. |
Risk And Classification
Problem Types: CWE-113
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Mcafee | Virusscan Enterprise | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Exploit – Page 40911 – Exploits Database | EXPLOIT-DB | www.exploit-db.com | |
| McAfee Corporate KB - Intel Security - Security Bulletin: VirusScan Enterprise for Linux/LinuxShield update fixes multiple vulnerabilities (CVE-2016-8016, CVE-2016-8017, CVE-2016-8018, CVE-2016-8019, CVE-2016-8020, CVE-2016-8021, CVE-2016-8022, CVE-2016-8023, CVE-2016-8024, CVE-2016-8025) SB10181 | CONFIRM | kc.mcafee.com | Vendor Advisory |
| McAfee VirusScan Enterprise Multiple Security Vulnerabilities | BID | www.securityfocus.com | |
| McAfee VirusScan Enterprise for Linux Multiple Bugs Let Remote Users Deny Service, Execute Arbitrary Code, and Obtain Potentially Sensitive Information - SecurityTracker | SECTRACK | www.securitytracker.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.