Vulnerability CVE-2005-3123


Published: 2005-10-30   Modified: 2012-02-12

Description:
Directory traversal vulnerability in GNUMP3D before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed.

See advisories in our WLB2 database:
Topic
Author
Date
Low
GNUMP3d Discloses Files on the Target System to Remote Users and Permits Cross-Site Scripting Attacks
Steve Kemp
29.10.2005

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
GNU -> Gnump3d 

 References:
http://www.securityfocus.com/bid/15228
http://www.debian.org/security/2005/dsa-877
http://secunia.com/advisories/17351
http://lists.gnu.org/archive/html/gnump3d-users/2005-10/msg00013.html
http://www.vupen.com/english/advisories/2005/2242
http://www.osvdb.org/20360
http://www.novell.com/linux/security/advisories/2005_28_sr.html
http://securitytracker.com/id?1015118
http://secunia.com/advisories/17559
http://www.novell.com/linux/security/advisories/2005_27_sr.html
http://securityreason.com/securityalert/127

Copyright 2024, cxsecurity.com

 

Back to Top