McAfee myCIO HTTP server directory traversal
|mcafee-mycio-directory-traversal (6834)||Medium Risk|
McAfee AsaP VirusScan could allow a remote attacker to traverse directories on the Web server. A remote attacker can send a specially-crafted URL request containing modified "dot dot" sequences that use three dots instead of two (/.../) to traverse directories and view or download any file outside of the Web root directory.
No remedy available as of July 1, 2014.
- BugTraq Mailing List, Wed Jul 11 2001 - 16:51:41 CDT: McAfee ASaP Virusscan - myCIO HTTP Server Directory Traversal Vulnerabilty.
- NTBugTraq Mailing List, Mon, 16 Jul 2001 12:55:20 -0700: McAfee ASaP Virusscan - MyCIO HTTP Server Directory Traversal Vul nerability.
- BID-3020: McAfee ASaP Virusscan Directory Traversal Vulnerability
- CVE-2001-1144: Directory traversal vulnerability in McAfee ASaP VirusScan agent 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP request.
- OSVDB ID: 4302: McAfee myCIO HTTP Arbitrary File Access
- OSVDB ID: 584: McAfee ASaP VirusScan Arbitrary File Access
- US-CERT VU#190267: McAfee ASaP VirusScan service does not adequately validate input
- McAfee ASaP VirusScan 1.0
Jul 11, 2001
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this