SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published: 2012-06-15T19:00:00Z

Updated: 2024-09-16T17:34:25.260Z

Reserved: 2012-05-14T00:00:00Z

Link: CVE-2012-2632

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2012-06-15T19:55:01.530

Modified: 2012-06-18T04:00:00.000

Link: CVE-2012-2632

cve-icon Redhat

No data.