Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 22 May 2013 13:06:18 +0200
From: Matthias Weckbecker <mweckbecker@...e.de>
To: oss-security@...ts.openwall.com
Subject: Fwd: [Full-disclosure] Thttpd 2.25b Directory Traversal Vulnerability

Hi,

has anybody possibly already confirmed this? It might also be worth
to assign a CVE to this if it turns out to be a reproducible issue.

Thanks,
Matthias

----------  Forwarded Message  ----------

Subject: [Full-disclosure] Thttpd 2.25b Directory Traversal Vulnerability
Date: Sunday 19 May 2013
From: "metropolis haxor" <metrOpolis@...uxmail.org>
To: full-disclosure@...ts.grok.org.uk

Hi guys,
You can find the software affected at 
http://www.acme.com/software/thttpd/thttpd-2.25b.tar.gz 
Thanks,
Metropolis

-------------------------------------------------------

-- 
Matthias Weckbecker, Senior Security Engineer, SUSE Security Team
SUSE LINUX Products GmbH, Maxfeldstr. 5, D-90409 Nuernberg, Germany
Tel: +49-911-74053-0;  http://suse.com/
SUSE LINUX Products GmbH, GF: Jeff Hawn, HRB 16746 (AG Nuernberg) 

View attachment "Thttpd 2.25b Directory Traversal Vulnerability.txt" of type "text/plain" (2345 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.