CVE-2006-3426
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Directory traversal vulnerability in (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (b) Novell ZENworks 6.2 SR1 and earlier allows remote attackers to overwrite arbitrary files and directories via a .. (dot dot) sequence in the (1) action, (2) agentid, or (3) index parameters to dagent/nwupload.asp, which are used as pathname components.
Vulnerabilidad de salto de directorio en (a) PatchLink Update Server (PLUS) anterior a v6.1 P1 y v6.2.x enterior a v6.2 SR1 P1 y (b) Novell ZENworks 6.2 SR1 y anteriores, permite a atacantes remotos sobreescribir ficheros de su elección a través de una secuencia ..(punto punto) en los parámetros (1) action, (2) agentid, or (3) index al dagent/nwupload.asp, que es usado como el componente de nombre de ruta.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-07-06 CVE Reserved
- 2006-07-07 CVE Published
- 2023-09-01 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html | Mailing List | |
http://securityreason.com/securityalert/1200 | Third Party Advisory | |
http://securitytracker.com/id?1016405 | Vdb Entry | |
http://www.securityfocus.com/archive/1/438710/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/18732 | Vdb Entry | |
http://www.vupen.com/english/advisories/2006/2595 | Vdb Entry | |
http://www.vupen.com/english/advisories/2006/2596 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/20876 | 2018-10-18 | |
http://secunia.com/advisories/20878 | 2018-10-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Lumension Search vendor "Lumension" | Patchlink Update Server Search vendor "Lumension" for product "Patchlink Update Server" | 6.1 Search vendor "Lumension" for product "Patchlink Update Server" and version "6.1" | - |
Affected
| ||||||
Lumension Search vendor "Lumension" | Patchlink Update Server Search vendor "Lumension" for product "Patchlink Update Server" | 6.2.0.181 Search vendor "Lumension" for product "Patchlink Update Server" and version "6.2.0.181" | - |
Affected
| ||||||
Lumension Search vendor "Lumension" | Patchlink Update Server Search vendor "Lumension" for product "Patchlink Update Server" | 6.2.0.189 Search vendor "Lumension" for product "Patchlink Update Server" and version "6.2.0.189" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Zenworks Search vendor "Novell" for product "Zenworks" | <= 6.2 Search vendor "Novell" for product "Zenworks" and version " <= 6.2" | sr1 |
Affected
|