Directory traversal vulnerability in Nullsoft SHOUTcast DSP before 1.9.6 filters directory traversal sequences before decoding, which allows remote attackers to read arbitrary files via encoded dot dot (%2E%2E) sequences in an HTTP GET request for a file path containing "/content".
References
Link | Resource |
---|---|
http://bugs.gentoo.org/show_bug.cgi?id=136721 | |
http://people.ksp.sk/~goober/advisory/001-shoutcast.html | Exploit Patch Vendor Advisory |
http://secunia.com/advisories/20524 | Exploit Patch Vendor Advisory |
http://security.gentoo.org/glsa/glsa-200607-05.xml | Exploit Patch |
http://securitytracker.com/id?1016493 | |
http://www.shoutcast.com/#news | Patch |
http://www.vupen.com/english/advisories/2006/2801 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2006-07-12T21:00:00
Updated: 2006-07-18T09:00:00
Reserved: 2006-07-12T00:00:00
Link: CVE-2006-3534
JSON object: View
NVD Information
Status : Modified
Published: 2006-07-12T21:05:00.000
Modified: 2011-03-08T02:38:51.750
Link: CVE-2006-3534
JSON object: View
Redhat Information
No data.
CWE