Vulnerability Description
Directory traversal vulnerability in GNUMP3D before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Gnump3D | 2.9 |
References
- http://lists.gnu.org/archive/html/gnump3d-users/2005-10/msg00013.htmlPatch
- http://secunia.com/advisories/17351ExploitPatchVendor Advisory
- http://secunia.com/advisories/17559Vendor Advisory
- http://securityreason.com/securityalert/127
- http://securitytracker.com/id?1015118
- http://www.debian.org/security/2005/dsa-877PatchVendor Advisory
- http://www.novell.com/linux/security/advisories/2005_27_sr.html
- http://www.novell.com/linux/security/advisories/2005_28_sr.html
- http://www.osvdb.org/20360
- http://www.securityfocus.com/bid/15228Patch
- http://www.vupen.com/english/advisories/2005/2242
- http://lists.gnu.org/archive/html/gnump3d-users/2005-10/msg00013.htmlPatch
- http://secunia.com/advisories/17351ExploitPatchVendor Advisory
- http://secunia.com/advisories/17559Vendor Advisory
- http://securityreason.com/securityalert/127
FAQ
What is CVE-2005-3123?
CVE-2005-3123 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in GNUMP3D before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." ...
How severe is CVE-2005-3123?
CVE-2005-3123 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3123?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Gnump3D.