| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060316193011.037CC5B93@lists.grok.org.uk>
Date: Thu Mar 16 20:44:45 2006
From: ahaning at gmail.com (Andrew Haninger)
Subject: [Advisory] * x Thu Mar 16 14:30:03 EST 2006 x *
Directory Transversal in Tripwire
[Advisory] * x Thu Mar 16 14:30:03 EST 2006 x * Directory Transversal in Tripwire
+++++++++++++
1. Description
+++++++++++++
Remote exploitation of a directory traversal vulnerability in Tripwire could allow attackers to overwrite or view arbitrary files with user-supplied contents.
+++++++++++++
2. History
+++++++++++++
2/26/2006 - Vendor Notification.
1/10/2006 - Vendor Reply.
3/16/2006 - Public Disclosure.
+++++++++++++
3. CVE Information
+++++++++++++
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-174086 to this issue
+++++++++++++
Appendix A Vendor Information
+++++++++++++
http://www.tripwire.com/
+++++++++++++
Appendix B References
+++++++++++++
RFC 7423
+++++++++++++
Contact
+++++++++++++
Andrew Haninger lolville@...m.la
1-888-565-9428
BEWARE THE JIZZTAPO!!!
..
_ .' `.
/\)
/ /
/ / /\
\ \ / \
_ \ \/ /\ \
(/\ \ / \ \
\ \ / \ (Y )
\ \/ /\ \ ""
\ / \ \
\/ / /
/ /
( Y)
""
CSFA GREM GIPS CAP SSCP