First published: Tue Aug 04 2009(Updated: )
Directory traversal vulnerability in ZNC before 0.072 allows remote attackers to overwrite arbitrary files via a crafted DCC SEND request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZNC | =0.044 | |
ZNC | =0.062 | |
ZNC | =0.045 | |
ZNC | =0.052 | |
ZNC | =0.058 | |
ZNC | =0.056 | |
ZNC | =0.070 | |
ZNC | =0.064 | |
ZNC | =0.068 | |
ZNC | =0.054 | |
ZNC | =0.060 | |
ZNC | =0.047 | |
ZNC | =0.066 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2658 has a severity rating classified as important due to its potential to overwrite arbitrary files.
To mitigate CVE-2009-2658, upgrade ZNC to version 0.072 or later.
CVE-2009-2658 affects all ZNC versions prior to 0.072, including versions 0.044 through 0.070.
CVE-2009-2658 enables remote attackers to exploit a directory traversal vulnerability through a crafted DCC SEND request.
The risks associated with CVE-2009-2658 include unauthorized file overwriting and potential system compromise.