First published: Sat Jan 14 2006(Updated: )
Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\ sequences in the RFILE argument of ussp-push.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Toshiba Bluetooth Wireless Device Driver | =3.00.11 | |
Toshiba Bluetooth Wireless Device Driver | <=4.00.23t | |
Toshiba Bluetooth Wireless Device Driver | =3.20.00 | |
Toshiba Bluetooth Wireless Device Driver | =3.00.12 | |
Toshiba Bluetooth Wireless Device Driver | =4.00.01t | |
Toshiba Bluetooth Wireless Device Driver | =3.20.04 | |
Toshiba Bluetooth Wireless Device Driver | =3.20.01 | |
Toshiba Bluetooth Wireless Device Driver | =3.00.31a | |
Toshiba Bluetooth Wireless Device Driver | =3.01.03 | |
Toshiba Bluetooth Wireless Device Driver | =3.00.32 | |
Toshiba Bluetooth Wireless Device Driver | =4.00.11 | |
Toshiba Bluetooth Wireless Device Driver | =3.20.02 | |
Toshiba Bluetooth Wireless Device Driver | =3.10.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0212 is classified as a high-severity vulnerability due to its potential to allow remote file uploads.
To fix CVE-2006-0212, update the Toshiba Bluetooth Stack to a version later than 4.00.23(T).
CVE-2006-0212 affects Toshiba Bluetooth Stack versions up to and including 4.00.23(T) as well as several earlier versions.
Yes, CVE-2006-0212 can be exploited remotely through directory traversal techniques with OBEX Push services.
Exploitation of CVE-2006-0212 allows attackers to upload arbitrary files to specified remote locations, potentially leading to system compromise.