Vulnerabilities > CVE-2006-3534 - Unspecified vulnerability in Nullsoft Shoutcast Server
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN nullsoft
nessus
Summary
Directory traversal vulnerability in Nullsoft SHOUTcast DSP before 1.9.6 filters directory traversal sequences before decoding, which allows remote attackers to read arbitrary files via encoded dot dot (%2E%2E) sequences in an HTTP GET request for a file path containing "/content".
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 19 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200607-05.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200607-05 (SHOUTcast server: Multiple vulnerabilities) The SHOUTcast server is vulnerable to a file disclosure when the server receives a specially crafted GET request. Furthermore it also fails to sanitize the input passed to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22012 |
published | 2006-07-10 |
reporter | This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/22012 |
title | GLSA-200607-05 : SHOUTcast server: Multiple vulnerabilities |
code |
|
References
- http://bugs.gentoo.org/show_bug.cgi?id=136721
- http://bugs.gentoo.org/show_bug.cgi?id=136721
- http://people.ksp.sk/~goober/advisory/001-shoutcast.html
- http://people.ksp.sk/~goober/advisory/001-shoutcast.html
- http://secunia.com/advisories/20524
- http://secunia.com/advisories/20524
- http://security.gentoo.org/glsa/glsa-200607-05.xml
- http://security.gentoo.org/glsa/glsa-200607-05.xml
- http://securitytracker.com/id?1016493
- http://securitytracker.com/id?1016493
- http://www.shoutcast.com/#news
- http://www.shoutcast.com/#news
- http://www.vupen.com/english/advisories/2006/2801
- http://www.vupen.com/english/advisories/2006/2801