First published: Wed Nov 06 2013(Updated: )
Directory traversal vulnerability in the Session Server in Attachmate Verastream Host Integrator (VHI) 6.0 through 7.5 SP 1 HF 1 allows remote attackers to upload and execute arbitrary files via a crafted message.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Attachmate Verastream Host Integrator | =6.0 | |
Attachmate Verastream Host Integrator | =6.5 | |
Attachmate Verastream Host Integrator | =6.6 | |
Attachmate Verastream Host Integrator | =7.0 | |
Attachmate Verastream Host Integrator | =7.1 | |
Attachmate Verastream Host Integrator | =7.5 | |
Attachmate Verastream Host Integrator | =7.5-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3626 is rated as a high-severity vulnerability due to its potential to allow remote file upload and execution.
To fix CVE-2013-3626, it is recommended to update to a patched version of Attachmate Verastream Host Integrator.
CVE-2013-3626 affects Attachmate Verastream Host Integrator versions 6.0 through 7.5 SP 1 HF 1.
CVE-2013-3626 facilitates directory traversal attacks that can lead to unauthorized file access and execution.
There are no officially documented workarounds for CVE-2013-3626; updating to a secure version is the recommended approach.