ID
VAR-E-200504-0243
CVE
cve_id: | CVE-2005-1228 | Trust: 0.3 |
TITLE
GNU GZip Filename Directory Traversal Vulnerability
Trust: 0.3
DESCRIPTION
The gzip utility is prone to a directory-traversal vulnerability. The issue occurs when gunzip is invoked on a malicious archive using the '-N' option.
An archive containing an absolute path for a filename that contains '/' characters can cause the file to be written using the absolute path contained in the filename.
A remote attacker may leverage this issue using a malicious archive to corrupt arbitrary files with the privileges of the user that is running the vulnerable software.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | freebsd | model: | -releng | scope: | eq | version: | 4.4 | Trust: 0.6 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.1 | Trust: 0.6 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 5.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 5.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 5.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux ppc | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | ubuntu | model: | linux ia64 | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | ubuntu | model: | linux ia32 | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | turbolinux | model: | workstation | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | turbolinux | model: | workstation | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | turbolinux | model: | server | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | turbolinux | model: | server | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | turbolinux | model: | server | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | turbolinux | model: | desktop | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | turbolinux | model: | home | scope: | - | version: | - | Trust: 0.3 |
vendor: | turbolinux | model: | appliance server workgroup edition | scope: | eq | version: | 1.0 | Trust: 0.3 |
vendor: | turbolinux | model: | appliance server hosting edition | scope: | eq | version: | 1.0 | Trust: 0.3 |
vendor: | trustix | model: | secure linux | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | trustix | model: | secure linux | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | trustix | model: | secure enterprise linux | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | sun | model: | solaris 9 x86 update | scope: | eq | version: | 2 | Trust: 0.3 |
vendor: | sun | model: | solaris 9 x86 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris | scope: | eq | version: | 9 | Trust: 0.3 |
vendor: | sun | model: | solaris 8 x86 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris 8 sparc | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris 10.0 x86 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | sgi | model: | propack | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | sgi | model: | advanced linux environment | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | sco | model: | unixware | scope: | eq | version: | 7.1.4 | Trust: 0.3 |
vendor: | sco | model: | open server | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | sco | model: | open server | scope: | eq | version: | 5.0.7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux ws | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux ws | scope: | eq | version: | 3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux ws ia64 | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux ws | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux es | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux es | scope: | eq | version: | 3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux es ia64 | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux es | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux as | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux as | scope: | eq | version: | 3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux as ia64 | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux as | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | redhat | model: | desktop | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | redhat | model: | desktop | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | redhat | model: | advanced workstation for the itanium processor ia64 | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | redhat | model: | advanced workstation for the itanium processor | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | openpkg | model: | openpkg | scope: | eq | version: | 2.3 | Trust: 0.3 |
vendor: | openpkg | model: | openpkg | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | openpkg | model: | current | scope: | - | version: | - | Trust: 0.3 |
vendor: | ipcop | model: | ipcop | scope: | eq | version: | 1.4.5 | Trust: 0.3 |
vendor: | ipcop | model: | ipcop | scope: | eq | version: | 1.4.4 | Trust: 0.3 |
vendor: | ipcop | model: | ipcop | scope: | eq | version: | 1.4.2 | Trust: 0.3 |
vendor: | ipcop | model: | ipcop | scope: | eq | version: | 1.4.1 | Trust: 0.3 |
vendor: | gnu | model: | gzip | scope: | eq | version: | 1.3.5 | Trust: 0.3 |
vendor: | gnu | model: | gzip | scope: | eq | version: | 1.3.4 | Trust: 0.3 |
vendor: | gnu | model: | gzip | scope: | eq | version: | 1.3.3 | Trust: 0.3 |
vendor: | gnu | model: | gzip | scope: | eq | version: | 1.3.2 | Trust: 0.3 |
vendor: | gnu | model: | gzip a | scope: | eq | version: | 1.2.4 | Trust: 0.3 |
vendor: | gnu | model: | gzip | scope: | eq | version: | 1.2.4 | Trust: 0.3 |
vendor: | gentoo | model: | linux | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 5.4 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 5.4 | Trust: 0.3 |
vendor: | freebsd | model: | -prerelease | scope: | eq | version: | 5.4 | Trust: 0.3 |
vendor: | freebsd | model: | -stable | scope: | eq | version: | 5.3 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 5.3 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 5.3 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 5.3 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 5.2.1 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | freebsd | model: | -release/alpha | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | freebsd | model: | -release-p5 | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | freebsd | model: | -release-p14 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | freebsd | model: | alpha | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | freebsd | model: | -stable | scope: | eq | version: | 4.11 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 4.11 | Trust: 0.3 |
vendor: | freebsd | model: | -release-p3 | scope: | eq | version: | 4.11 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 4.10 | Trust: 0.3 |
vendor: | freebsd | model: | -release-p8 | scope: | eq | version: | 4.10 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 4.10 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.10 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 4.9 | Trust: 0.3 |
vendor: | freebsd | model: | -prerelease | scope: | eq | version: | 4.9 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.9 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 4.8 | Trust: 0.3 |
vendor: | freebsd | model: | -release-p7 | scope: | eq | version: | 4.8 | Trust: 0.3 |
vendor: | freebsd | model: | -prerelease | scope: | eq | version: | 4.8 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.8 | Trust: 0.3 |
vendor: | freebsd | model: | -stable | scope: | eq | version: | 4.7 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 4.7 | Trust: 0.3 |
vendor: | freebsd | model: | -release-p17 | scope: | eq | version: | 4.7 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 4.7 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.7 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.6.2 | Trust: 0.3 |
vendor: | freebsd | model: | -stable | scope: | eq | version: | 4.6 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 4.6 | Trust: 0.3 |
vendor: | freebsd | model: | -release-p20 | scope: | eq | version: | 4.6 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 4.6 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.6 | Trust: 0.3 |
vendor: | freebsd | model: | -stablepre2002-03-07 | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | freebsd | model: | -stable | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | freebsd | model: | -release-p32 | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | freebsd | model: | -stable | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | freebsd | model: | -release-p42 | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | freebsd | model: | -stable | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | freebsd | model: | -release-p38 | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | freebsd | model: | -stablepre122300 | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | freebsd | model: | -stablepre050201 | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | freebsd | model: | -stable | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | freebsd | model: | -stable | scope: | eq | version: | 4.1.1 | Trust: 0.3 |
vendor: | freebsd | model: | -release | scope: | eq | version: | 4.1.1 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.1.1 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.0.x | Trust: 0.3 |
vendor: | freebsd | model: | -releng | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | freebsd | model: | alpha | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.6.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.6.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.6 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.5.12 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.5.11 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.5.10 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.5.9 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.5.6 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.6.3 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.6.2 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.6 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.5.12 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.5.11 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | cosmicperl | model: | directory pro | scope: | eq | version: | 10.0.3 | Trust: 0.3 |
vendor: | avaya | model: | s8710 r2.0.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | s8710 r2.0.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | s8700 r2.0.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | s8700 r2.0.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | s8500 r2.0.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | s8500 r2.0.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | s8300 r2.0.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | s8300 r2.0.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | network messaging | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | modular messaging | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | avaya | model: | modular messaging | scope: | eq | version: | 1.1 | Trust: 0.3 |
vendor: | avaya | model: | intuity lx | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | integrated management | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | avaya | model: | integrated management | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | cvlan | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | converged communications server | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.7 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.6 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.5 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.4 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.3 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.2 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.1 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.3.9 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.3.8 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.3.7 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.3.6 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.3.5 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.3.4 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.3.3 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.3.2 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.3.1 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.3 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.2.8 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.2.7 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.2.6 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.2.5 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.2.4 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.2.3 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.2.2 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.2.1 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.2 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.1.5 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.1.4 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.1.3 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.1.2 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.1.1 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.1 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.0 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.7 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.6 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.5 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.4 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.3 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.1 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.9 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.8 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.7 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.6 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.5 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.4 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.3 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.1 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.3 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.8 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.7 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.6 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.5 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.4 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.3 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.1 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.1.5 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.1.4 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.1.3 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.1.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.1.1 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.0.4 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.0.3 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.0.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.0.1 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.03 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | ne | version: | 4.7 | Trust: 0.3 |
vendor: | f5 | model: | big-ip | scope: | ne | version: | 4.5.13 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | ne | version: | 4.7 | Trust: 0.3 |
vendor: | f5 | model: | 3-dns | scope: | ne | version: | 4.5.13 | Trust: 0.3 |
EXPLOIT
An exploit archive is available at the following location:
http://bugs.debian.org/cgi-bin/bugreport.cgi/dir-traversal-bug.gz?bug=305255&msg=3&att=1
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Input Validation Error
Trust: 0.3
CREDITS
Discovery of this issue is credited to Ulf Harnhammar <metaur@telia.com>.
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2005-1228 | Trust: 0.3 |
db: | BID | id: | 13290 | Trust: 0.3 |
REFERENCES
url: | http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1 | Trust: 0.3 |
url: | http://rhn.redhat.com/errata/rhsa-2005-357.html | Trust: 0.3 |
url: | http://support.avaya.com/elmodocs2/security/asa-2005-172.pdf | Trust: 0.3 |
url: | http://tech.f5.com/home/bigip/solutions/advisories/sol4532.html | Trust: 0.3 |
url: | http://www.ipcop.org/modules.php?op=modload&name=news&file=article&sid=21&mode=thread&order=0&thold=0 | Trust: 0.3 |
url: | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255 | Trust: 0.3 |
url: | http://www.gzip.org/ | Trust: 0.3 |
SOURCES
db: | BID | id: | 13290 |
LAST UPDATE DATE
2022-07-27T09:23:36.169000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 13290 | date: | 2006-08-02T20:26:00 |
SOURCES RELEASE DATE
db: | BID | id: | 13290 | date: | 2005-04-20T00:00:00 |