CVE-2006-3534
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/07/2006
Last modified:
03/04/2025
Description
Directory traversal vulnerability in Nullsoft SHOUTcast DSP before 1.9.6 filters directory traversal sequences before decoding, which allows remote attackers to read arbitrary files via encoded dot dot (%2E%2E) sequences in an HTTP GET request for a file path containing "/content".
Impact
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:nullsoft:shoutcast_server:*:*:*:*:*:*:*:* | 1.9.5 (including) | |
cpe:2.3:a:nullsoft:shoutcast_server:1.7.1:*:linux:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.8.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.8.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.8.3:*:win32:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.8.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.8.9:*:freebsd:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.8.9:*:linux:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.8.9:*:mac_os_x:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.8.9:*:solaris:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.8.9:*:win32:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.9.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.9.2:*:win32:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.9.4:*:linux:*:*:*:*:* | ||
cpe:2.3:a:nullsoft:shoutcast_server:1.9.4:*:mac_os_x:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.gentoo.org/show_bug.cgi?id=136721
- http://people.ksp.sk/~goober/advisory/001-shoutcast.html
- http://secunia.com/advisories/20524
- http://security.gentoo.org/glsa/glsa-200607-05.xml
- http://securitytracker.com/id?1016493=
- http://www.shoutcast.com/#news
- http://www.vupen.com/english/advisories/2006/2801
- http://bugs.gentoo.org/show_bug.cgi?id=136721
- http://people.ksp.sk/~goober/advisory/001-shoutcast.html
- http://secunia.com/advisories/20524
- http://security.gentoo.org/glsa/glsa-200607-05.xml
- http://securitytracker.com/id?1016493=
- http://www.shoutcast.com/#news
- http://www.vupen.com/english/advisories/2006/2801