Vulnerability Description
Directory traversal vulnerability in emumail.cgi in EMU Webmail 4.5.x and 5.1.0 allows remote attackers to read arbitrary files or list arbitrary directories via a .. (dot dot) in the type parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emumail | Emumail | 3.0 |
| Emumail | Emumail Red Hat Linux | 5.0 |
| Emumail | Emumail Unix | 5.0 |
References
- http://archives.neohapsis.com/archives/bugtraq/2002-04/0066.html
- http://www.emumail.com/downloads/download_unix.html/
- http://www.iss.net/security_center/static/8766.phpPatchVendor Advisory
- http://www.securityfocus.com/bid/4435PatchVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2002-04/0066.html
- http://www.emumail.com/downloads/download_unix.html/
- http://www.iss.net/security_center/static/8766.phpPatchVendor Advisory
- http://www.securityfocus.com/bid/4435PatchVendor Advisory
FAQ
What is CVE-2002-0531?
CVE-2002-0531 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in emumail.cgi in EMU Webmail 4.5.x and 5.1.0 allows remote attackers to read arbitrary files or list arbitrary directories via a .. (dot dot) in the type parameter.
How severe is CVE-2002-0531?
CVE-2002-0531 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-0531?
Check the references section above for vendor advisories and patch information. Affected products include: Emumail Emumail, Emumail Emumail Red Hat Linux, Emumail Emumail Unix.