CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2006-4140

Directory traversal vulnerability in IPCheck Server Monitor before 5.3.3.639/640 allows remote attackers to read arbitrary files via modified .. (dot dot) sequences in the URL, including (1) "..%2f" (encoded "/" slash), "..../" (multiple dot), and "..%255c../" (double-encoded "\" backslash).
Publish Date : 2006-08-14 Last Update Date : 2008-09-05
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
5.0
Confidentiality Impact Partial (There is considerable informational disclosure.)
Integrity Impact None (There is no impact to the integrity of the system)
Availability Impact None (There is no impact to the availability of the system.)
Access Complexity Low (Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s) Directory traversal
CWE ID CWE id is not defined for this vulnerability

- Products Affected By CVE-2006-4140

# Product Type Vendor Product Version Update Edition Language
1 Application Ipcheck Server Monitor 4.3.1.368 Version Details Vulnerabilities
2 Application Ipcheck Server Monitor 4.3.1.382 Version Details Vulnerabilities
3 Application Ipcheck Server Monitor 4.4.1.521 Version Details Vulnerabilities
4 Application Ipcheck Server Monitor 4.4.1.522 Version Details Vulnerabilities
5 Application Ipcheck Server Monitor 5.0.1.272 Version Details Vulnerabilities
6 Application Ipcheck Server Monitor 5.0.1.299 Version Details Vulnerabilities
7 Application Ipcheck Server Monitor 5.0.1.309 Version Details Vulnerabilities
8 Application Ipcheck Server Monitor 5.0.1.321 Version Details Vulnerabilities
9 Application Ipcheck Server Monitor 5.1.0.341 Version Details Vulnerabilities
10 Application Ipcheck Server Monitor 5.1.0.342 Version Details Vulnerabilities
11 Application Ipcheck Server Monitor 5.1.0.345 Version Details Vulnerabilities
12 Application Ipcheck Server Monitor 5.2.0.404 Version Details Vulnerabilities
13 Application Ipcheck Server Monitor 5.2.0.405 Version Details Vulnerabilities
14 Application Ipcheck Server Monitor 5.2.0.418 Version Details Vulnerabilities
15 Application Ipcheck Server Monitor 5.2.0.420 Version Details Vulnerabilities
16 Application Ipcheck Server Monitor 5.2.2.449 Version Details Vulnerabilities
17 Application Ipcheck Server Monitor 5.2.2.451 Version Details Vulnerabilities
18 Application Ipcheck Server Monitor 5.3.0.506 Version Details Vulnerabilities
19 Application Ipcheck Server Monitor 5.3.0.507 Version Details Vulnerabilities
20 Application Ipcheck Server Monitor 5.3.0.508 Version Details Vulnerabilities
21 Application Ipcheck Server Monitor 5.3.0.509 Version Details Vulnerabilities
22 Application Ipcheck Server Monitor 5.3.1.574 Version Details Vulnerabilities
23 Application Ipcheck Server Monitor 5.3.1.575 Version Details Vulnerabilities
24 Application Ipcheck Server Monitor 5.3.1.578 Version Details Vulnerabilities
25 Application Ipcheck Server Monitor 5.3.1.579 Version Details Vulnerabilities
26 Application Ipcheck Server Monitor 5.3.1.580 Version Details Vulnerabilities
27 Application Ipcheck Server Monitor 5.3.1.581 Version Details Vulnerabilities
28 Application Ipcheck Server Monitor 5.3.1.586 Version Details Vulnerabilities
29 Application Ipcheck Server Monitor 5.3.1.587 Version Details Vulnerabilities
30 Application Ipcheck Server Monitor 5.3.2.605 Version Details Vulnerabilities
31 Application Ipcheck Server Monitor 5.3.2.606 Version Details Vulnerabilities
32 Application Ipcheck Server Monitor 5.3.2.609 Version Details Vulnerabilities
33 Application Ipcheck Server Monitor 5.3.2.610 Version Details Vulnerabilities
34 Application Ipcheck Server Monitor 5.3.2.616 Version Details Vulnerabilities
35 Application Ipcheck Server Monitor 5.3.2.617 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Ipcheck Server Monitor 35

- References For CVE-2006-4140

http://securitytracker.com/id?1016676
SECTRACK 1016676
http://www.frsirt.com/english/advisories/2006/3259
VUPEN ADV-2006-3259
http://www.paessler.com/forum/viewtopic.php?p=4047&sid=f8c0f03a69d9498338797c6ea3cc6733 CONFIRM
http://www.paessler.com/ipcheck/history CONFIRM
http://www.securityfocus.com/archive/1/archive/1/442822/100/0/threaded
BUGTRAQ 20060810 Directory Traversal vulnerability in IPCheck Monitor Server
http://www.securityfocus.com/archive/1/archive/1/444227/100/0/threaded
BUGTRAQ 20060824 Re: Directory Traversal vulnerability in IPCheck Monitor Server
http://www.securityfocus.com/bid/19473
BID 19473 IPCheck Server Monitor Directory Traversal Vulnerability Release Date:2007-07-06
http://xforce.iss.net/xforce/xfdb/28341
XF ipcheck-url-directory-traversal(28341)
http://secunia.com/advisories/21468
SECUNIA 21468
http://securityreason.com/securityalert/1389
SREASON 1389

- Metasploit Modules Related To CVE-2006-4140

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.