[NT] Directory Traversal Vulnerability in Plug & Play Web Server

From: SecuriTeam (support_at_securiteam.com)
Date: 09/21/03

  • Next message: SecuriTeam: "[UNIX] LSH Vulnerable to Remote Root Compromise (channel_commands, read_line)"
    To: list@securiteam.com
    Date: 21 Sep 2003 13:13:00 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      Directory Traversal Vulnerability in Plug & Play Web Server
    ------------------------------------------------------------------------

    SUMMARY

    The <http://www.pandpsoftware.com> Plug and Play Web Server "provides all
    of the tools you need to host your own website. The tools are bundled
    together in one comprehensive software package that it is incredibly easy
    to use and maintain". A vulnerability was found in the product's web
    server allowing remote attackers grab files that reside outside the bound
    HTML root directory.

    DETAILS

    Vulnerable systems:
     * Plug & Play Web Server version 1.0002c

    Examples:
    http://localhost/../../autoexec.bat
    http://localhost/../../windows/win.ini

    Vendor status:
    The vendor has been informed, and they are fixing this bug. The updated
    version, when released, can be downloaded from:
    <http://www.pandpsoftware.com/download.htm>
    http://www.pandpsoftware.com/download.htm.

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:b_naamneh@hotmail.com> Bahaa
    Naamneh.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[UNIX] LSH Vulnerable to Remote Root Compromise (channel_commands, read_line)"

    Relevant Pages

    • [NT] w3wp DoS
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... 1/12/2006 - Vendor requested for additional info ... recv(conn_socket, szBuffer, 256, 0); ...
      (Securiteam)
    • [NT] Trend Micro HouseCall ActiveX Control Arbitrary Code Execution
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Trend Micro HouseCall ActiveX Control Arbitrary Code Execution ... The vulnerability is caused due to an implementation error within the ... 18/08/2008 - Vendor notified. ...
      (Securiteam)
    • [NT] Microsoft Hierarchical FlexGrid Control Integer Overflows (MS08-070)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Microsoft Hierarchical FlexGrid Control Integer Overflows ... 28/08/2007 - Vendor notified. ...
      (Securiteam)
    • [NT] Adobe PageMaker PMD File Processing Buffer Overflows
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The vulnerabilities are caused due to boundary errors when processing ... The vendor will be releasing a fix for the stack-based buffer overflow ... 02/06/2008 - Vendor asks for CVE identifier. ...
      (Securiteam)
    • [NT] CA ARCserve Backup RPC "handle_t" Argument Vulnerability
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... CA ARCserve Backup RPC "handle_t" Argument Vulnerability ... 24/10/2007 - Vendor notified. ... 21/05/2008 - Vendor notifies expected release in October 2008. ...
      (Securiteam)