First published: Tue Mar 31 2015(Updated: )
EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Embedthis GoAhead Web Server | =3.0.0 | |
Embedthis GoAhead Web Server | =3.3.1 | |
Embedthis GoAhead Web Server | =3.3.2 | |
Embedthis GoAhead Web Server | =3.3.3 | |
Embedthis GoAhead Web Server | =3.3.4 | |
Embedthis GoAhead Web Server | =3.3.5 | |
Embedthis GoAhead Web Server | =3.3.6 | |
Embedthis GoAhead Web Server | =3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9707 has a high severity rating due to the potential for remote code execution and denial of service attacks.
To fix CVE-2014-9707, update to a patched version of EmbedThis GoAhead that addresses the directory traversal vulnerability.
CVE-2014-9707 affects EmbedThis GoAhead versions 3.0.0 through 3.4.1.
CVE-2014-9707 can be exploited for directory traversal attacks, heap-based buffer overflows, and potentially arbitrary code execution.
CVE-2014-9707 remains a relevant threat if affected versions are still in use and have not been secured.