[NEWS] IBM AlphaWorks TFTP Server for Java Directory Traversal

From: support@securiteam.com
Date: 07/29/01

From: support@securiteam.com
To: list@securiteam.com
Subject: [NEWS] IBM AlphaWorks TFTP Server for Java Directory Traversal
Message-Id: <20010729204743.9F00C138BF@mail.der-keiler.de>
Date: Sun, 29 Jul 2001 22:47:43 +0200 (CEST)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com

  IBM AlphaWorks TFTP Server for Java Directory Traversal


IBM's <http://alphaworks.ibm.com/tech/TFTP> AlphaWorks TFTP Server allows
Java programmers to incorporate a TFTP server into their code. A security
vulnerability in the product allows attackers to traverse outside the
normal bounding root directory of the TFTP server.


The IBM alphaWorks TFTP Server for Java is vulnerable to a 'standard'
directory traversal attack (i.e. ../../). This would allow an attacker to
either upload or download files to and from sensitive directories on the
remote computer that are outside the normally bounding root directory.


The information has been provided by <mailto:Patrick@spm.org.za> Patrick


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.