|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200511-05] GNUMP3d: Directory traversal and XSS vulnerabilities Vulnerability Scan
Vulnerability Scan Summary GNUMP3d: Directory traversal and XSS vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200511-05
(GNUMP3d: Directory traversal and XSS vulnerabilities)
Steve Kemp reported about two cross-site scripting attacks that
are related to the handling of files (CVE-2005-3424, CVE-2005-3425).
Also reported is a directory traversal vulnerability which comes from
the attempt to sanitize input paths (CVE-2005-3123).
Impact
A remote attacker could exploit this to disclose sensitive
information or inject and execute malicious script code, potentially
compromising the victim's browser.
Workaround
There is no known workaround at this time.
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3123
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3424
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3425
Solution:
All GNUMP3d users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-sound/gnump3d-2.9.7"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|