Directory traversal vulnerability in GNUMP3D before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.gnu.org/archive/html/gnump3d-users/2005-10/msg00013.html - Patch | |
References | () http://secunia.com/advisories/17351 - Exploit, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/17559 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/127 - | |
References | () http://securitytracker.com/id?1015118 - | |
References | () http://www.debian.org/security/2005/dsa-877 - Patch, Vendor Advisory | |
References | () http://www.novell.com/linux/security/advisories/2005_27_sr.html - | |
References | () http://www.novell.com/linux/security/advisories/2005_28_sr.html - | |
References | () http://www.osvdb.org/20360 - | |
References | () http://www.securityfocus.com/bid/15228 - Patch | |
References | () http://www.vupen.com/english/advisories/2005/2242 - |
Information
Published : 2005-10-30 20:02
Updated : 2024-11-21 00:01
NVD link : CVE-2005-3123
Mitre link : CVE-2005-3123
CVE.ORG link : CVE-2005-3123
JSON object : View
Products Affected
gnu
- gnump3d
CWE