Directory traversal vulnerability in GNUMP3D before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed.
Link | Tags |
---|---|
http://www.novell.com/linux/security/advisories/2005_28_sr.html | vendor advisory |
http://www.osvdb.org/20360 | vdb entry |
http://securityreason.com/securityalert/127 | third party advisory |
http://securitytracker.com/id?1015118 | vdb entry |
http://secunia.com/advisories/17559 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/15228 | patch vdb entry |
http://lists.gnu.org/archive/html/gnump3d-users/2005-10/msg00013.html | patch mailing list |
http://www.vupen.com/english/advisories/2005/2242 | vdb entry |
http://www.debian.org/security/2005/dsa-877 | patch vendor advisory |
http://secunia.com/advisories/17351 | patch vendor advisory third party advisory exploit |
http://www.novell.com/linux/security/advisories/2005_27_sr.html | vendor advisory |