CVE-2006-0212
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/01/2006
Last modified:
03/04/2025
Description
Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\ sequences in the RFILE argument of ussp-push.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:toshiba:bluetooth_stack:*:*:*:*:*:*:*:* | 4.00.23t (including) | |
cpe:2.3:a:toshiba:bluetooth_stack:3.00.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:toshiba:bluetooth_stack:3.00.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:toshiba:bluetooth_stack:3.00.31a:*:*:*:*:*:*:* | ||
cpe:2.3:a:toshiba:bluetooth_stack:3.00.32:*:*:*:*:*:*:* | ||
cpe:2.3:a:toshiba:bluetooth_stack:3.01.03:*:*:*:*:*:*:* | ||
cpe:2.3:a:toshiba:bluetooth_stack:3.10.00:*:*:*:*:*:*:* | ||
cpe:2.3:a:toshiba:bluetooth_stack:3.20.00:*:*:*:*:*:*:* | ||
cpe:2.3:a:toshiba:bluetooth_stack:3.20.01:*:*:*:*:*:*:* | ||
cpe:2.3:a:toshiba:bluetooth_stack:3.20.02:*:*:*:*:*:*:* | ||
cpe:2.3:a:toshiba:bluetooth_stack:3.20.04:*:*:*:*:*:*:* | ||
cpe:2.3:a:toshiba:bluetooth_stack:4.00.01t:*:*:*:*:*:*:* | ||
cpe:2.3:a:toshiba:bluetooth_stack:4.00.11:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2
- http://marc.info/?l=full-disclosure&m=113712413907526&w=2
- http://secunia.com/advisories/18437
- http://securitytracker.com/id?1015486=
- http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt
- http://www.osvdb.org/22380
- http://www.securityfocus.com/archive/1/421993/100/0/threaded
- http://www.securityfocus.com/bid/16236
- http://www.vupen.com/english/advisories/2006/0184
- http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2
- http://marc.info/?l=full-disclosure&m=113712413907526&w=2
- http://secunia.com/advisories/18437
- http://securitytracker.com/id?1015486=
- http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt
- http://www.osvdb.org/22380
- http://www.securityfocus.com/archive/1/421993/100/0/threaded
- http://www.securityfocus.com/bid/16236
- http://www.vupen.com/english/advisories/2006/0184