DansGuardian 2.8 and earlier allows remote attackers to bypass the extension filtering rule via a hex encoded extension or . in the filename.
Link | Tags |
---|---|
http://secunia.com/advisories/12191 | third party advisory patch |
http://www.securityfocus.com/bid/10823 | vdb entry patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16836 | vdb entry |
http://www.osvdb.org/8270 | vdb entry |
http://dansguardian.org/?page=history | |
http://marc.info/?l=bugtraq&m=109113126217408&w=2 | mailing list |
http://securitytracker.com/id?1010817 | vdb entry |