Gravedad: High
  Fecha recomendada: 04 de febrero de 2011

  Descripción

A vulnerability in the default installation of Apache HTTP Server could allow a remote attacker to traverse directories on the Web server and view and execute files. A remote attacker could create a specially-crafted URL request containing hexadecimal URL encoded "backslash dot dot" sequences (in the form of 5c%2e%2e%5c) to traverse directories and view arbitrary files and directories on the Web server. An attacker could use this vulnerability to execute commands on the system by traversing to the /cgi-bin/ directory.

  Revelación de la información

Download the latest NVW pattern file from this site:
http://www.trendmicro.com/download/product.asp?productid=45

  Software y versión afectados

  • Apache web server version 2.0.39 and previous 2.0.x (Windows/Netware/OS2)