Korean
<< Back
VID 22383
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The GNUMP3d server is vulnerable to multiple input validation vulnerabilities. GNUMP3d is an open-source audio / video streaming server for Linux-based operating systems. GNUMP3d versions prior to 2.9.6 are vulnerable to two vulnerabilities, which can be exploited by a remote attacker to conduct cross-site scripting and directory traversal attacks.

1) Directory traversal vulnerability in GNUMP3d before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed.
2) Cross-site scripting (XSS) vulnerabilities in GNUMP3d before 2.9.6 allow remote attackers to inject arbitrary web script or HTML via 404 error pages or unspecified vectors.

* References:
http://lists.gnu.org/archive/html/gnump3d-users/2005-10/msg00013.html
http://savannah.gnu.org/cgi-bin/viewcvs/gnump3d/gnump3d/ChangeLog?rev=1.134&content-type=text/vnd.viewcvs-markup
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0580.html
http://securitytracker.com/id?1015118
http://secunia.com/advisories/17351
http://www.frsirt.com/english/advisories/2005/2242

* Platforms Affected:
Debiuan Linux, GNUMP3d versions prior to 2.9.3-1sarge2
GNU Project, GNUMP3d versions prior to 2.9.6
Linux Any version
Recommendation Upgrade to the latest version of GNUMP3d (2.9.7 or later), available from the GNUMP3d Web site at http://savannah.gnu.org/download/gnump3d/

For Debian Linux 3.1:
Upgrade to the latest version of gnump3d (2.9.3-1sarge2 or later), as listed in Debian Security Advisory DSA 877-1 at http://www.debian.org/security/2005/dsa-877
Related URL CVE-2005-3123,CVE-2005-3424,CVE-2005-3425 (CVE)
Related URL 15226,15228,15341 (SecurityFocus)
Related URL 22902,22903 (ISS)