The config method in Henrik Storner Hobbit monitor before 4.1.2p2 permits access to files outside of the intended configuration directory, which allows remote attackers to obtain sensitive information via requests to the hobbitd daemon on port 1984/tcp.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21317 - Patch, Vendor Advisory | |
References | () http://sourceforge.net/project/shownotes.php?release_id=436594&group_id=128058 - Patch | |
References | () http://www.securityfocus.com/archive/1/442036/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19317 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/3139 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28204 - |
Information
Published : 2006-08-07 19:04
Updated : 2025-04-03 01:03
NVD link : CVE-2006-4003
Mitre link : CVE-2006-4003
CVE.ORG link : CVE-2006-4003
JSON object : View
Products Affected
hobbit_monitor
- hobbit_monitor
CWE