lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060316074601.EAADCB4C@lists.grok.org.uk>
Date: Thu Mar 16 07:54:30 2006
From: sergio at undercafe.cl (sergio@...ercafe.cl)
Subject: Advisory * +Thu Mar 16 02:45:55 EST 2006+ *
	Directory Transversal in VMware




Advisory * +Thu Mar 16 02:45:55 EST 2006+ * Directory Transversal in VMware




8=================D~~~~~~~~~~~~~~~~~~~~~~
[+] Background
8=================D~~~~~~~~~~~~~~~~~~~~~~
There was no identified background.
8=================D~~~~~~~~~~~~~~~~~~~~~~
[+] Description
8=================D~~~~~~~~~~~~~~~~~~~~~~
Remote exploitation of a directory traversal vulnerability in VMware could allow attackers to overwrite or view arbitrary files with user-supplied contents.

8=================D~~~~~~~~~~~~~~~~~~~~~~
[+] Workaround
8=================D~~~~~~~~~~~~~~~~~~~~~~
There had been no identified workarounds regarding the issue indentified.
8=================D~~~~~~~~~~~~~~~~~~~~~~
[+] CVE Information
8=================D~~~~~~~~~~~~~~~~~~~~~~
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-366369 to this issue

8=================D~~~~~~~~~~~~~~~~~~~~~~
Appendix A Vendor Information
8=================D~~~~~~~~~~~~~~~~~~~~~~
http://www.vmware.com/

8=================D~~~~~~~~~~~~~~~~~~~~~~
Appendix B References
8=================D~~~~~~~~~~~~~~~~~~~~~~
RFC 3818

8=================D~~~~~~~~~~~~~~~~~~~~~~
Contact
8=================D~~~~~~~~~~~~~~~~~~~~~~
SACAR1 sergio@...ercafe.cl

GSAE CEH CSFA SSP-MPA GIPS GHTQ GWAS CAP 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ