lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060316183716.A215F2A01@lists.grok.org.uk>
Date: Thu Mar 16 20:15:29 2006
From: sixsigma98 at hotmail.com (sixsigma98@...mail.com)
Subject: [ADVISORY] | -Thu Mar 16 13:37:09 EST 2006- |
	Directory Transversal in ISC INN




[ADVISORY] | -Thu Mar 16 13:37:09 EST 2006- | Directory Transversal in ISC INN




===================
1. Background
===================
There has had been no background commentary on this problem indentified.
===================
2. Description
===================
Remote exploitation of a directory traversal vulnerability in ISC INN could allow attackers to overwrite or view arbitrary files with user-supplied contents.

===================
3. History
===================
2-26-2006 - Vendor Notification.
1-15-2006 - Vendor Reply.
3-16-2006 - Public Disclosure.
===================
4. Workaround
===================
This vulnerability has no identified workarounds.
===================
5. CVE Information
===================
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-665571 to this issue

===================
Appendix A Vendor Information
===================
http://www.isc.org/index.pl?/sw/inn/

===================
Appendix B References
===================
RFC 1100

===================
Contact
===================
Ray P lolville@...m.la
1-888-565-9428

GSAE GREM SSP-CNSA SSP-MPA GIPS GHTQ 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ