Vulnerability CVE-2010-1512


Published: 2010-05-17   Modified: 2012-02-13

Description:
Directory traversal vulnerability in aria2 before 1.9.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.

See advisories in our WLB2 database:
Topic
Author
Date
Low
aria2 metalink \"name\" Directory Traversal Vulnerability
Secunia Research
24.05.2010

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Tatsuhiro tsujikawa -> Aria2 

 References:
http://downloads.sourceforge.net/project/aria2/stable/aria2-1.9.3/NEWS
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041753.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041754.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041758.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://security.gentoo.org/glsa/glsa-201101-04.xml
http://www.debian.org/security/2010/dsa-2047
http://www.mandriva.com/security/advisories?name=MDVSA-2010:106
http://www.securityfocus.com/archive/1/511280/100/0/threaded
http://www.securityfocus.com/bid/40142
http://www.vupen.com/english/advisories/2010/1228
http://www.vupen.com/english/advisories/2010/1229
http://www.vupen.com/english/advisories/2011/0116

Copyright 2024, cxsecurity.com

 

Back to Top