Descriptionframework/common/messageheaderparser.cpp in Tntnet before 2.2.1 allows remote attackers to obtain sensitive information via a header that ends in \n instead of \r\n, which prevents a null terminator from being added and causes Tntnet to include headers from other requests.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs735881

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tntnet (PTS)buster, stretch2.2.1-3fixed
bullseye, sid2.2.1-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[wheezy] - tntnet <no-dsa> (Minor issue)
[squeeze] - tntnet <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems