Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Peer-To-Peer File Sharing >> DC++ Download Drive File Appending Vulnerability


Vulnerability Assessment Details

DC++ Download Drive File Appending Vulnerability

Vulnerability Assessment Summary
Checks for download drive file appending vulnerability in DC++

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote Windows host contains an application that is affected by a
file integrity flaw.

Description :

According to its version number, the DC++ client installed on the
remote host is prone to a vulnerability that may let a remote user
append data to files anywhere on the drive on which DC++ is installed.

See also :

http://sourceforge.net/project/shownotes.php?group_id=40287&release_id=319316

Solution :

Upgrade to DC++ 0.674 or greater.

Network Security Threat Level:

Low / CVSS Base Score : 3
(AV:R/AC:L/Au:NR/C:N/A:N/I:C/B:N)

Networks Security ID: 13088

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

Intel Xeon X5660 2.8 GHz Six Core Processor (please read description)
$0.99
Intel Xeon X5660 2.8 GHz Six Core Processor (please read description) pictureIntel Xeon X5660 2.8 GHz Six Core Processor (please read description)
$0.99
Intel Xeon X5660 2.8 GHz Six Core Processor (please read description) pictureIntel Core i7-2720QM 2.20GHz 4 Cores 8 Threads SR014 CPU Laptop
$42.5
Intel Core i7-2720QM 2.20GHz 4 Cores 8 Threads SR014 CPU Laptop pictureLot Of 2 Xeon E5-2620 6-Core SR0KW LGA2011 Processor
$21.0
Lot Of 2 Xeon E5-2620 6-Core SR0KW LGA2011 Processor  picture


Discussions

No Discussions have been posted on this vulnerability.