CVE-2006-0817
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
Absolute path directory traversal vulnerability in (a) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (b) VisNetic MailServer before 8.5.0.5 allows remote attackers to include arbitrary files via a full Windows path and drive letter in the (1) language parameter in accounts/inc/include.php and (2) lang_settings parameter in admin/inc/include.php, which is not properly sanitized by the securepath function, a related issue to CVE-2005-4556.
Vulnerabilidad de salto de directorio absoluto en (a) MERAK Mail Server para Windows 8.3.8r con anteriores IceWarp Web Mail 5.6.1 y (b) VisNetic MailServer anterior a 8.5.0.5 permite a atacantes remotos incluir archivos de su elección a través de una ruta completa de Windows y controlador de cartas en el parámetro (1) language en accounts/inc/include.php y (2) parámetro lang_settings en admin/inc/include.php, lo cual no es desinfectado por la función securepath, un asunto relacionado con CVE-2005-4556.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-02-21 CVE Reserved
- 2006-07-18 CVE Published
- 2023-09-13 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1016513 | Vdb Entry | |
http://securitytracker.com/id?1016514 | Vdb Entry | |
http://www.osvdb.org/27328 | Vdb Entry | |
http://www.securityfocus.com/archive/1/440297/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/440302/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/19007 | Vdb Entry | |
http://www.vupen.com/english/advisories/2006/2825 | Vdb Entry | |
http://www.vupen.com/english/advisories/2006/2826 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27773 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/18953 | 2024-08-07 | |
http://secunia.com/advisories/18966 | 2024-08-07 | |
http://secunia.com/secunia_research/2006-12/advisory | 2024-08-07 | |
http://secunia.com/secunia_research/2006-14/advisory | 2024-08-07 | |
http://www.securityfocus.com/bid/19002 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Deerfield Search vendor "Deerfield" | Visnetic Mail Server Search vendor "Deerfield" for product "Visnetic Mail Server" | 8.3.5 Search vendor "Deerfield" for product "Visnetic Mail Server" and version "8.3.5" | - |
Affected
| ||||||
Icewarp Search vendor "Icewarp" | Web Mail Search vendor "Icewarp" for product "Web Mail" | 5.6.0 Search vendor "Icewarp" for product "Web Mail" and version "5.6.0" | - |
Affected
| ||||||
Merak Search vendor "Merak" | Mail Server Search vendor "Merak" for product "Mail Server" | 8.3.8r Search vendor "Merak" for product "Mail Server" and version "8.3.8r" | windows |
Affected
|