lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu Mar 16 20:36:02 2006
From: the.soylent at gmail.com (the.soylent)
Subject: !ADVISORY! # =Thu Mar 16 14:19:19 EST 2006= #
	Directory Transversal in Ethereal




!ADVISORY! # =Thu Mar 16 14:19:19 EST 2006= # Directory Transversal in Ethereal




8=============D~~~~~~~~~~~~~
[+] Background
8=============D~~~~~~~~~~~~~
There is no background.
8=============D~~~~~~~~~~~~~
[+] Description
8=============D~~~~~~~~~~~~~
Remote exploitation of a directory traversal vulnerability in Ethereal could allow attackers to overwrite or view arbitrary files with user-supplied contents.

8=============D~~~~~~~~~~~~~
[+] History
8=============D~~~~~~~~~~~~~
2-23-2006 [+] Vendor Notification.
1-22-2006 [+] Vendor Reply.
3-16-2006 [+] Public Disclosure.
8=============D~~~~~~~~~~~~~
[+] Vendor Response
8=============D~~~~~~~~~~~~~
Ethereal has presented no identified information regarding this vulnerability in question.
8=============D~~~~~~~~~~~~~
[+] CVE Information
8=============D~~~~~~~~~~~~~
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-784643 to this issue

8=============D~~~~~~~~~~~~~
Appendix A Vendor Information
8=============D~~~~~~~~~~~~~
http://www.ethereal.com/



8=============D~~~~~~~~~~~~~
Contact
8=============D~~~~~~~~~~~~~
the.soylent the.soylent@...il.com

GSAE CEH CSFA SSP-MPA GIPS GHTQ GWAS CAP SSCP 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ