lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20080402204247.42f3819c.aluigi@autistici.org>
Date: Wed, 2 Apr 2008 20:42:47 +0200
From: Luigi Auriemma <aluigi@...istici.org>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk,
	packet@...ketstormsecurity.org, cert@...t.org, news@...uriteam.com
Subject: Directory traversal in LANDesk Management Suite 8.80.1.1


#######################################################################

                             Luigi Auriemma

Application:  LANDesk Management Suite
              http://www.landesk.com/products/ldms/index.aspx
Versions:     <= 8.80.1.1
Platforms:    Windows
Bug:          directory traversal
Exploitation: remote
Date:         01 Apr 2008
Author:       Luigi Auriemma
              e-mail: aluigi@...istici.org
              web:    aluigi.org


#######################################################################


1) Introduction
2) Bug
3) The Code
4) Fix


#######################################################################

===============
1) Introduction
===============


LANDesk is a well known system management software.


#######################################################################

======
2) Bug
======


The PXE TFTP Service is vulnerable to a classical directory traversal
vulnerability exploitable through the adding of one or more chars
before the usual dotdot pattern.

The interesting thing is that version 8.80.1.1 has been released just
to fix another directory traversal vulnerability.


#######################################################################

===========
3) The Code
===========


http://aluigi.org/testz/tftpx.zip

  tftpx SERVER x\..\..\..\..\..\..\..\boot.ini none
  tftpx SERVER what_you_want/../../../../../../../windows/win.ini none


#######################################################################

======
4) Fix
======


No fix


#######################################################################


--- 
Luigi Auriemma
http://aluigi.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ