CVE-2006-3426
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/07/2006
Last modified:
03/04/2025
Description
Directory traversal vulnerability in (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (b) Novell ZENworks 6.2 SR1 and earlier allows remote attackers to overwrite arbitrary files and directories via a .. (dot dot) sequence in the (1) action, (2) agentid, or (3) index parameters to dagent/nwupload.asp, which are used as pathname components.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:lumension:patchlink_update_server:6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lumension:patchlink_update_server:6.2.0.181:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lumension:patchlink_update_server:6.2.0.189:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:zenworks:*:sr1:*:*:*:*:*:* | 6.2 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html
- http://secunia.com/advisories/20876
- http://secunia.com/advisories/20878
- http://securityreason.com/securityalert/1200
- http://securitytracker.com/id?1016405=
- http://www.securityfocus.com/archive/1/438710/100/0/threaded
- http://www.securityfocus.com/bid/18732
- http://www.vupen.com/english/advisories/2006/2595
- http://www.vupen.com/english/advisories/2006/2596
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html
- http://secunia.com/advisories/20876
- http://secunia.com/advisories/20878
- http://securityreason.com/securityalert/1200
- http://securitytracker.com/id?1016405=
- http://www.securityfocus.com/archive/1/438710/100/0/threaded
- http://www.securityfocus.com/bid/18732
- http://www.vupen.com/english/advisories/2006/2595
- http://www.vupen.com/english/advisories/2006/2596



