First published: Tue Sep 12 2006(Updated: )
Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mono Xsp | ||
SUSE Open Enterprise Server | =1 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.3 | |
SUSE Linux | =9.3 | |
SUSE Linux | =9.3 | |
SUSE Linux | =10.0 | |
SUSE Linux | =10.0 | |
SUSE Linux | =10.1 | |
SUSE Linux | =10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2658 is classified as a medium severity vulnerability which allows remote attackers to read arbitrary files from the server.
To fix CVE-2006-2658, you should update the affected version of Mono Xsp or apply a security patch provided by SUSE.
The vulnerability CVE-2006-2658 specifically affects the xsp component of the mod_mono in the Mono/C# web server.
SUSE Open Enterprise Server 1 and SUSE Linux versions 9.2 through 10.1 are impacted by CVE-2006-2658.
CVE-2006-2658 is a directory traversal vulnerability that allows exploitation through HTTP requests.