Directory traversal vulnerability in Nullsoft SHOUTcast DSP before 1.9.6 filters directory traversal sequences before decoding, which allows remote attackers to read arbitrary files via encoded dot dot (%2E%2E) sequences in an HTTP GET request for a file path containing "/content".
References
Link | Resource |
---|---|
http://bugs.gentoo.org/show_bug.cgi?id=136721 | |
http://people.ksp.sk/~goober/advisory/001-shoutcast.html | Exploit Patch Vendor Advisory |
http://www.shoutcast.com/#news | Patch |
http://security.gentoo.org/glsa/glsa-200607-05.xml | Exploit Patch |
http://secunia.com/advisories/20524 | Exploit Patch Vendor Advisory |
http://securitytracker.com/id?1016493 | |
http://www.vupen.com/english/advisories/2006/2801 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-07-12 14:05
Updated : 2011-03-07 18:38
NVD link : CVE-2006-3534
Mitre link : CVE-2006-3534
JSON object : View
CWE
Products Affected
nullsoft
- shoutcast_server