CERTA-2004-AVI-226
Vulnerability from certfr_avis - Published: - Updated:
Deux vulnérabilités dans WinGate permettent à un utilisateur mal intentionné de lire n'importe quel fichier.
Description
WinGate est un serveur mandataire pour plate-forme Microsoft Windows.
Deux vulnérabilités dans WinGate permettent à un utilisateur mal
intentionné, via une URL habilement construite, de lire n'importe quel
fichier sur la plate-forme où réside WinGate.
Contournement provisoire
Désactiver le serveur mandataire ou restreindre l'accès à des hôtes de confiance.
Solution
- Pour WinGate série 6, installer la version 6.0 RC1 (build 963) ;
- pour WinGate série 5, aucun correctif de disponible à ce jour.
WinGate est téléchargeable à l'adresse Internet suivante :
http://www.wingate.com/download.php
None
Impacted products
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "pour WinGate s\u00e9rie 6 : WinGate 6.0 beta 2 build 942 et versions ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Pour WinGate s\u00e9rie 5 : WinGate 5.2.3 build 901 et versions ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nWinGate est un serveur mandataire pour plate-forme Microsoft Windows. \nDeux vuln\u00e9rabilit\u00e9s dans WinGate permettent \u00e0 un utilisateur mal\nintentionn\u00e9, via une URL habilement construite, de lire n\u0027importe quel\nfichier sur la plate-forme o\u00f9 r\u00e9side WinGate.\n\n## Contournement provisoire\n\nD\u00e9sactiver le serveur mandataire ou restreindre l\u0027acc\u00e8s \u00e0 des h\u00f4tes de\nconfiance.\n\n## Solution\n\n- Pour WinGate s\u00e9rie 6, installer la version 6.0 RC1 (build 963) ;\n- pour WinGate s\u00e9rie 5, aucun correctif de disponible \u00e0 ce jour.\n\nWinGate est t\u00e9l\u00e9chargeable \u00e0 l\u0027adresse Internet suivante :\n\n http://www.wingate.com/download.php\n",
"cves": [],
"links": [
{
"title": "Site Internet de WinGate :",
"url": "http://www.wingate.com/product-wingate.php"
}
],
"reference": "CERTA-2004-AVI-226",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-07-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Lecture de fichiers arbitraires"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s dans WinGate permettent \u00e0 un utilisateur mal\nintentionn\u00e9 de lire n\u0027importe quel fichier.\n",
"title": "Vuln\u00e9rabilit\u00e9 de WinGate",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 iDEFENSE du 01 juillet 2004",
"url": "http://www.idefense.com/application/poi/display?id=113"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…