WinWrapper Admin Server Arbitrary File Reading Vulnerability



WinWrapper is a commercial firewall implementation for the Microsoft Windows platform. It is distributed and maintained by ASCII NT.

WinWrapper provides a remote administration interface that runs on port 4096. Due to insufficient validation of input, it is possible for a remote user to traverse local directories on a system via the administrative interface using a classic dot-dot-slash (../) attack.

Information

Bugtraq ID: 3219
Class: Input Validation Error
CVE: CVE-2001-1139

Remote: Yes
Local: No
Published: Aug 22 2001 12:00AM
Updated: Jul 11 2009 07:56AM
Credit: This vulnerability was announced in an SNS Security Advisory on August 22, 2001.
Vulnerable: ASCII NT WinWrapper Professional 2.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server Japanese Edition
- Microsoft Windows 95 SR2
- Microsoft Windows 98 SP1
- Microsoft Windows 98SE
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4


Not Vulnerable: ASCII NT WinWrapper Professional 2.0.1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server Japanese Edition
- Microsoft Windows 95 SR2
- Microsoft Windows 98 SP1
- Microsoft Windows 98SE
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4


Exploit


No exploit is required for this vulnerability.


References:

Related Posts