Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200511-05] GNUMP3d: Directory traversal and XSS vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
GNUMP3d: Directory traversal and XSS vulnerabilities

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200511-05
(GNUMP3d: Directory traversal and XSS vulnerabilities)


Steve Kemp reported about two cross-site scripting attacks that
are related to the handling of files (CVE-2005-3424, CVE-2005-3425).
Also reported is a directory traversal vulnerability which comes from
the attempt to sanitize input paths (CVE-2005-3123).

Impact

A remote attacker could exploit this to disclose sensitive
information or inject and execute malicious script code, potentially
compromising the victim's browser.

Workaround

There is no known workaround at this time.

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3123
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3424
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3425


Solution:
All GNUMP3d users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-sound/gnump3d-2.9.7"


Threat Level: Medium


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.