Full Disclosure mailing list archives
Advisory 2006-03-11 Directory Transversal in
From: " Suresec Advisories rn" <advisories () suresec org>
Date: Sat, 11 Mar 2006 22:43:17 -0800
Tripwire Message-ID: <486e6df0edfa2dda6932a66ef5c8a887 () www c0replay net> X-Priority: 3 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="iso-8859-1" Advisory 2006-03-11 Directory Transversal in Tripwire I. BACKGROUND Advisory marked for immediate release. II. DESCRIPTION Remote exploitation of a directory traversal vulnerability in Tripwire could allow attackers to overwrite or view arbitrary files with user-supplied contents. III. HISTORY This advisory has no history. IV. WORKAROUND There are no known workarounds. V. VENDOR RESPONSE Tripwire has not commented on this issue. VI. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-891531 to this issue. APPENDIX A. - Vendor Information http://www.tripwire.com/ APPENDIX B. - References NONE CONTACT: * Suresec Advisories bantown () spam la *1-888-LOL-WHAT *CISSP GSAE CCE CEH CSFA GREM SSP-CNSA SSP-MPA GIPS GHTQ GWAS _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Advisory 2006-03-11 Directory Transversal in Suresec Advisories rn (Mar 11)
- <Possible follow-ups>
- Advisory 2006-03-11 Directory Transversal in Nic Wernerrn (Mar 11)