Vulnerability Description
Directory traversal vulnerability in FastJar 0.93, as used in Gnu GCC 4.1.1 and earlier, and 3.4.6 and earlier, allows user-assisted attackers to overwrite arbitrary files via a .jar file containing filenames with "../" sequences.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fastjar | Fastjar | 0.93 |
References
- ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
- http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359
- http://lists.debian.org/debian-gcc/2006/05/msg00317.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
- http://rhn.redhat.com/errata/RHSA-2007-0473.html
- http://secunia.com/advisories/17839Vendor Advisory
- http://secunia.com/advisories/21100Vendor Advisory
- http://secunia.com/advisories/21797
- http://secunia.com/advisories/25098
- http://secunia.com/advisories/25281
- http://secunia.com/advisories/25633
- http://secunia.com/advisories/25894
- http://secunia.com/advisories/26909
- http://secunia.com/advisories/27706
- http://secunia.com/advisories/29334
FAQ
What is CVE-2006-3619?
CVE-2006-3619 is a vulnerability with a CVSS score of 2.6 (LOW). Directory traversal vulnerability in FastJar 0.93, as used in Gnu GCC 4.1.1 and earlier, and 3.4.6 and earlier, allows user-assisted attackers to overwrite arbitrary files via a .jar file containing f...
How severe is CVE-2006-3619?
CVE-2006-3619 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3619?
Check the references section above for vendor advisories and patch information. Affected products include: Fastjar Fastjar.