Directory traversal vulnerability in the OBEX FTP Service in the Microsoft Bluetooth stack in Windows Mobile 6 Professional, and probably Windows Mobile 5.0 for Pocket PC and 5.0 for Pocket PC Phone Edition, allows remote authenticated users to list arbitrary directories, and create or read arbitrary files, via a .. (dot dot) in a pathname. NOTE: this can be leveraged for code execution by writing to a Startup folder.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://secunia.com/advisories/33598 | third party advisory broken link |
http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/Microsoft-Bluetooth-Stack-Directory-Traversal.html | broken link exploit |
http://www.securityfocus.com/archive/1/500199/100/0/threaded | mailing list vdb entry third party advisory broken link |
http://securityreason.com/securityalert/4938 | third party advisory exploit |
http://www.securityfocus.com/bid/33359 | vdb entry third party advisory broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/48124 | vdb entry third party advisory |