First published: Fri Jul 07 2006(Updated: )
Directory traversal vulnerability in (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (b) Novell ZENworks 6.2 SR1 and earlier allows remote attackers to overwrite arbitrary files and directories via a .. (dot dot) sequence in the (1) action, (2) agentid, or (3) index parameters to dagent/nwupload.asp, which are used as pathname components.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell ZENworks | <=6.2 | |
Lumension PatchLink Update Server | =6.2.0.181 | |
Lumension PatchLink Update Server | =6.1 | |
Lumension PatchLink Update Server | =6.2.0.189 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3426 is considered to be a high severity vulnerability due to its potential for file and directory overwrite by remote attackers.
To fix CVE-2006-3426, update the PatchLink Update Server to version 6.1 P1 or later, or to version 6.2 SR1 P1 or later for Novell ZENworks.
CVE-2006-3426 affects Lumension PatchLink Update Server versions 6.1 and 6.2, and Novell ZENworks 6.2 SR1 and earlier.
Yes, CVE-2006-3426 can be exploited remotely using directory traversal techniques.
Exploitation of CVE-2006-3426 could allow attackers to overwrite arbitrary files and directories, potentially leading to further compromise of the system.