Vulnerability CVE-2006-3426


Published: 2006-07-06   Modified: 2012-02-12

Description:
Directory traversal vulnerability in (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (b) Novell ZENworks 6.2 SR1 and earlier allows remote attackers to overwrite arbitrary files and directories via a .. (dot dot) sequence in the (1) action, (2) agentid, or (3) index parameters to dagent/nwupload.asp, which are used as pathname components.

See advisories in our WLB2 database:
Topic
Author
Date
High
Multiple Vulnerabilities in PatchLink Update Server 6
Chris Steipp (cs...
11.07.2006

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Novell -> Zenworks 
Lumension -> Patchlink update server 

 References:
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html
http://securityreason.com/securityalert/1200
http://securitytracker.com/id?1016405
http://www.securityfocus.com/archive/1/438710/100/0/threaded
http://www.securityfocus.com/bid/18732
http://www.vupen.com/english/advisories/2006/2595
http://www.vupen.com/english/advisories/2006/2596

Copyright 2024, cxsecurity.com

 

Back to Top