one for Orbit downloader too, unpatched so far

http://secunia.com/advisories/39527/

On May 14, 1:51 am, Anthony Bryan <[email protected]> wrote:
> now would be a good time to check any other apps :)
>
> The vulnerability is caused due to the application not properly
> sanitising the "name" attribute of the "file" element of metalink
> files before using it to download files. If a user is tricked into
> downloading from a specially crafted metalink file, this can be
> exploited to download files to directories outside of the intended
> download directory via directory traversal attacks.
>
> An attacker can exploit this issue by crafting a malicious metalink
> file using widely available tools and utilities.
>
> aria2 metalink "name" Directory Traversal 
> Vulnerabilityhttp://secunia.com/advisories/39529
>
> Free Download Manager metalink "name" Directory 
> Traversalhttp://secunia.com/secunia_research/2010-67/
>
> KDE KGet Insecure File Operation and Directory 
> Traversalhttp://secunia.com/advisories/39528/
> --
> (( Anthony Bryan ... Metalink [http://www.metalinker.org]
>   )) Easier, More Reliable, Self Healing Downloads
>
> --
> You received this message because you are subscribed to the Google Groups 
> "Metalink Discussion" group.
> To post to this group, send email to [email protected].
> To unsubscribe from this group, send email to 
> [email protected].
> For more options, visit this group 
> athttp://groups.google.com/group/metalink-discussion?hl=en.

-- 
You received this message because you are subscribed to the Google Groups 
"Metalink Discussion" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/metalink-discussion?hl=en.

Reply via email to