CVE编号
CVE-2006-3619利用情况
暂无补丁情况
N/A披露时间
2006-07-26漏洞描述
Directory traversal vulnerability in FastJar 0.93, as used in Gnu GCC 4.1.1 and earlier, and 3.4.6 and earlier, allows user-assisted attackers to overwrite arbitrary files via a .jar file containing filenames with "../" sequences.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc | |
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359 | |
http://lists.debian.org/debian-gcc/2006/05/msg00317.html | |
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html | |
http://rhn.redhat.com/errata/RHSA-2007-0473.html | |
http://secunia.com/advisories/17839 | |
http://secunia.com/advisories/21100 | |
http://secunia.com/advisories/21797 | |
http://secunia.com/advisories/25098 | |
http://secunia.com/advisories/25281 | |
http://secunia.com/advisories/25633 | |
http://secunia.com/advisories/25894 | |
http://secunia.com/advisories/26909 | |
http://secunia.com/advisories/27706 | |
http://secunia.com/advisories/29334 | |
http://security.gentoo.org/glsa/glsa-200711-23.xml | |
http://support.avaya.com/elmodocs2/security/ASA-2007-189.htm | |
http://www.debian.org/security/2006/dsa-1170 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2008:066 | |
http://www.osvdb.org/21337 | |
http://www.redhat.com/support/errata/RHSA-2007-0220.html | |
http://www.securityfocus.com/bid/15669 | |
http://www.securitytracker.com/id?1017987 | |
http://www.vupen.com/english/advisories/2005/2686 | |
http://www.vupen.com/english/advisories/2006/2866 | |
http://www.vupen.com/english/advisories/2007/3229 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27806 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | fastjar | fastjar | 0.93 | - |
- 攻击路径 网络
- 攻击复杂度 高
- 权限要求 无
- 影响范围 N/A
- 用户交互 需要
- 可用性 无
- 保密性 无
- 完整性 部分地
还没有评论,来说两句吧...