lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <73513768779b8629400b0d0fc9e36ed1@www.c0replay.net> Date: Sun Mar 12 17:23:15 2006 From: mmaiffret at eeye.com (Marc Maiffret) Subject: Advisory 2006-03-12 Directory Transversal in Apple iTunes Advisory 2006-03-12 Directory Transversal in Apple iTunes I. BACKGROUND Advisory marked for immediate release. II. DESCRIPTION Remote exploitation of a directory traversal vulnerability in Apple iTunes could allow attackers to overwrite or view arbitrary files with user-supplied contents. III. HISTORY This advisory has no history. IV. WORKAROUND There are no known workarounds. V. VENDOR RESPONSE Apple iTunes has not commented on this issue. VI. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-284146 to this issue. APPENDIX A. - Vendor Information http://www.apple.com/itunes/ APPENDIX B. - References http://bantown.com/banforge/release.rar CONTACT: *Marc Maiffret bantown@...m.la *1-888-LOL-WHAT *CISSP GSAE CCE CEH CSFA GREM SSP-CNSA SSP-MPA GIPS GHTQ GWAS