VID |
22383 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The GNUMP3d server is vulnerable to multiple input validation vulnerabilities. GNUMP3d is an open-source audio / video streaming server for Linux-based operating systems. GNUMP3d versions prior to 2.9.6 are vulnerable to two vulnerabilities, which can be exploited by a remote attacker to conduct cross-site scripting and directory traversal attacks.
1) Directory traversal vulnerability in GNUMP3d before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed. 2) Cross-site scripting (XSS) vulnerabilities in GNUMP3d before 2.9.6 allow remote attackers to inject arbitrary web script or HTML via 404 error pages or unspecified vectors.
* References: http://lists.gnu.org/archive/html/gnump3d-users/2005-10/msg00013.html http://savannah.gnu.org/cgi-bin/viewcvs/gnump3d/gnump3d/ChangeLog?rev=1.134&content-type=text/vnd.viewcvs-markup http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0580.html http://securitytracker.com/id?1015118 http://secunia.com/advisories/17351 http://www.frsirt.com/english/advisories/2005/2242
* Platforms Affected: Debiuan Linux, GNUMP3d versions prior to 2.9.3-1sarge2 GNU Project, GNUMP3d versions prior to 2.9.6 Linux Any version |
Recommendation |
Upgrade to the latest version of GNUMP3d (2.9.7 or later), available from the GNUMP3d Web site at http://savannah.gnu.org/download/gnump3d/
For Debian Linux 3.1: Upgrade to the latest version of gnump3d (2.9.3-1sarge2 or later), as listed in Debian Security Advisory DSA 877-1 at http://www.debian.org/security/2005/dsa-877 |
Related URL |
CVE-2005-3123,CVE-2005-3424,CVE-2005-3425 (CVE) |
Related URL |
15226,15228,15341 (SecurityFocus) |
Related URL |
22902,22903 (ISS) |
|