var-200901-0408
Vulnerability from variot
Directory traversal vulnerability in the OBEX FTP Service in the Microsoft Bluetooth stack in Windows Mobile 6 Professional, and probably Windows Mobile 5.0 for Pocket PC and 5.0 for Pocket PC Phone Edition, allows remote authenticated users to list arbitrary directories, and create or read arbitrary files, via a .. (dot dot) in a pathname. NOTE: this can be leveraged for code execution by writing to a Startup folder. ( dot dot ) Through strings, arbitrary directories may be enumerated and arbitrary files may be created or viewed. The HTC OBEX FTP service is prone to a directory-traversal vulnerability. Exploiting this issue allows an attacker to write arbitrary files to locations outside the application's current directory, download arbitrary files, and obtain sensitive information. Other attacks may also be possible. The issue affects HTC devices running the OBEX FTP service on Windows Mobile 6.0 and 6.1. ----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list?
Click here to learn more: http://secunia.com/advisories/business_solutions/
TITLE: Microsoft Windows Mobile Bluetooth Stack OBEX Directory Traversal
SECUNIA ADVISORY ID: SA33598
VERIFY ADVISORY: http://secunia.com/advisories/33598/
CRITICAL: Less critical
IMPACT: Security Bypass, Exposure of system information, Exposure of sensitive information
WHERE:
From remote
OPERATING SYSTEM: Microsoft Windows Mobile 6.x http://secunia.com/advisories/product/14717/
DESCRIPTION: Alberto Moreno Tablado has reported a vulnerability in Microsoft Windows Mobile, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions.
Successful exploitation requires OBEX read or write access.
SOLUTION: Restrict access to trusted users only.
PROVIDED AND/OR DISCOVERED BY: Alberto Moreno Tablado
ORIGINAL ADVISORY: http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/Microsoft-Bluetooth-Stack-Directory-Traversal.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200901-0408", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "windows mobile", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "5.0" }, { "model": "windows mobile", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "6.0" }, { "model": "microsoft windows mobile", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": null }, { "model": "microsoft windows mobile", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "6.0" }, { "model": "microsoft windows mobile", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "5.0" }, { "model": "touch viva", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "touch pro", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "2" }, { "model": "touch pro", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "touch hd", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "touch find", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "touch dual", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "touch diamond", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "touch cruise", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "touch", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "s740", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "s730", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "s710", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "p6500", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "0" }, { "model": "advantage", "scope": "eq", "trust": 0.3, "vendor": "htc", "version": "x75100" } ], "sources": [ { "db": "BID", "id": "33359" }, { "db": "JVNDB", "id": "JVNDB-2009-001695" }, { "db": "CNNVD", "id": "CNNVD-200901-273" }, { "db": "NVD", "id": "CVE-2009-0244" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alberto Moreno Tablado", "sources": [ { "db": "BID", "id": "33359" }, { "db": "CNNVD", "id": "CNNVD-200901-273" } ], "trust": 0.9 }, "cve": "CVE-2009-0244", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.8, "id": "CVE-2009-0244", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2009-0244", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2009-0244", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2009-0244", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2009-0244", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200901-273", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001695" }, { "db": "CNNVD", "id": "CNNVD-200901-273" }, { "db": "NVD", "id": "CVE-2009-0244" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in the OBEX FTP Service in the Microsoft Bluetooth stack in Windows Mobile 6 Professional, and probably Windows Mobile 5.0 for Pocket PC and 5.0 for Pocket PC Phone Edition, allows remote authenticated users to list arbitrary directories, and create or read arbitrary files, via a .. (dot dot) in a pathname. NOTE: this can be leveraged for code execution by writing to a Startup folder. ( dot dot ) Through strings, arbitrary directories may be enumerated and arbitrary files may be created or viewed. The HTC OBEX FTP service is prone to a directory-traversal vulnerability. \nExploiting this issue allows an attacker to write arbitrary files to locations outside the application\u0027s current directory, download arbitrary files, and obtain sensitive information. Other attacks may also be possible. \nThe issue affects HTC devices running the OBEX FTP service on Windows Mobile 6.0 and 6.1. ----------------------------------------------------------------------\n\nDid you know that a change in our assessment rating, exploit code\navailability, or if an updated patch is released by the vendor, is\nnot part of this mailing-list?\n\nClick here to learn more:\nhttp://secunia.com/advisories/business_solutions/\n\n----------------------------------------------------------------------\n\nTITLE:\nMicrosoft Windows Mobile Bluetooth Stack OBEX Directory Traversal\n\nSECUNIA ADVISORY ID:\nSA33598\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/33598/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSecurity Bypass, Exposure of system information, Exposure of\nsensitive information\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nMicrosoft Windows Mobile 6.x\nhttp://secunia.com/advisories/product/14717/\n\nDESCRIPTION:\nAlberto Moreno Tablado has reported a vulnerability in Microsoft\nWindows Mobile, which can be exploited by malicious users to disclose\nsensitive information and bypass certain security restrictions. \n\nSuccessful exploitation requires OBEX read or write access. \n\nSOLUTION:\nRestrict access to trusted users only. \n\nPROVIDED AND/OR DISCOVERED BY:\nAlberto Moreno Tablado\n\nORIGINAL ADVISORY:\nhttp://www.seguridadmobile.com/windows-mobile/windows-mobile-security/Microsoft-Bluetooth-Stack-Directory-Traversal.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2009-0244" }, { "db": "JVNDB", "id": "JVNDB-2009-001695" }, { "db": "BID", "id": "33359" }, { "db": "PACKETSTORM", "id": "74345" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-0244", "trust": 3.5 }, { "db": "BID", "id": "33359", "trust": 1.9 }, { "db": "SECUNIA", "id": "33598", "trust": 1.7 }, { "db": "SREASON", "id": "4938", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2009-001695", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20090119 MICROSOFT BLUETOOTH STACK OBEX DIRECTORY TRAVERSAL", "trust": 0.6 }, { "db": "XF", "id": "48124", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200901-273", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "74345", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "33359" }, { "db": "JVNDB", "id": "JVNDB-2009-001695" }, { "db": "PACKETSTORM", "id": "74345" }, { "db": "CNNVD", "id": "CNNVD-200901-273" }, { "db": "NVD", "id": "CVE-2009-0244" } ] }, "id": "VAR-200901-0408", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.29166666 }, "last_update_date": "2024-11-23T22:14:36.257000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "http://www.microsoft.com/ja/jp/default.aspx" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001695" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.0 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001695" }, { "db": "NVD", "id": "CVE-2009-0244" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/microsoft-bluetooth-stack-directory-traversal.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/33359" }, { "trust": 1.6, "url": "http://securityreason.com/securityalert/4938" }, { "trust": 1.6, "url": "http://secunia.com/advisories/33598" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/500199/100/0/threaded" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48124" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0244" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/48124" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/500199/100/0/threaded" }, { "trust": 0.3, "url": "http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/htc-windows-mobile-obex-ftp-service-directory-traversal.html" }, { "trust": 0.3, "url": "/archive/1/504820" }, { "trust": 0.3, "url": "/archive/1/500199" }, { "trust": 0.3, "url": "http://www.htc.com/europe/supportdownload.aspx?p_id=133\u0026cat=0\u0026dl_id=609" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/33598/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/14717/" } ], "sources": [ { "db": "BID", "id": "33359" }, { "db": "JVNDB", "id": "JVNDB-2009-001695" }, { "db": "PACKETSTORM", "id": "74345" }, { "db": "CNNVD", "id": "CNNVD-200901-273" }, { "db": "NVD", "id": "CVE-2009-0244" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "33359" }, { "db": "JVNDB", "id": "JVNDB-2009-001695" }, { "db": "PACKETSTORM", "id": "74345" }, { "db": "CNNVD", "id": "CNNVD-200901-273" }, { "db": "NVD", "id": "CVE-2009-0244" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-01-20T00:00:00", "db": "BID", "id": "33359" }, { "date": "2009-07-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001695" }, { "date": "2009-01-27T15:24:52", "db": "PACKETSTORM", "id": "74345" }, { "date": "2009-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-200901-273" }, { "date": "2009-01-21T20:30:00.453000", "db": "NVD", "id": "CVE-2009-0244" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-07-28T11:50:00", "db": "BID", "id": "33359" }, { "date": "2024-02-22T07:08:00", "db": "JVNDB", "id": "JVNDB-2009-001695" }, { "date": "2009-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200901-273" }, { "date": "2024-11-21T00:59:25.760000", "db": "NVD", "id": "CVE-2009-0244" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200901-273" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Windows\u00a0Mobile\u00a06\u00a0Professional\u00a0 Run on \u00a0Microsoft\u00a0Bluetooth\u00a0 stack of \u00a0OBEX\u00a0FTP\u00a0 service, \u00a0Pocket\u00a0PC\u00a0 and \u00a0Pocket\u00a0PC\u00a0Phone\u00a0Edition\u00a05.0\u00a0 for \u00a0Windows\u00a0Mobile\u00a05.0\u00a0 directory traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001695" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-200901-273" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.