Directory traversal vulnerability in Nullsoft SHOUTcast DSP before 1.9.6 filters directory traversal sequences before decoding, which allows remote attackers to read arbitrary files via encoded dot dot (%2E%2E) sequences in an HTTP GET request for a file path containing "/content".
Link | Tags |
---|---|
http://people.ksp.sk/~goober/advisory/001-shoutcast.html | patch vendor advisory exploit |
http://securitytracker.com/id?1016493 | vdb entry |
http://secunia.com/advisories/20524 | patch vendor advisory third party advisory exploit |
http://www.vupen.com/english/advisories/2006/2801 | vdb entry |
http://bugs.gentoo.org/show_bug.cgi?id=136721 | |
http://www.shoutcast.com/#news | patch |
http://security.gentoo.org/glsa/glsa-200607-05.xml | patch vendor advisory exploit |