First published: Sun Oct 30 2005(Updated: )
Directory traversal vulnerability in GNUMP3D before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Gnump3d | =2.9 | |
GNU Gnump3d | =2.9.5 | |
GNU Gnump3d | =2.9.2 | |
GNU Gnump3d | =2.9.4 | |
GNU Gnump3d | =2.9.3 | |
GNU Gnump3d | =2.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3123 has a medium severity rating due to its potential for unauthorized file access.
To fix CVE-2005-3123, upgrade GNUMP3D to version 2.9.6 or later, which addresses the directory traversal vulnerability.
CVE-2005-3123 affects all versions of GNUMP3D prior to 2.9.6.
CVE-2005-3123 is classified as a directory traversal vulnerability.
Yes, CVE-2005-3123 can allow remote attackers to read arbitrary files, potentially leading to data exposure.