CVE-2005-2670 (CNNVD-200508-238)
中文标题:
HAURI Anti-Virus 目录遍历漏洞
英文标题:
Directory traversal vulnerability in HAURI Anti-Virus products including ViRobot Expert 4.0, Advance...
漏洞描述
中文描述:
Directory traversal vulnerability in HAURI Anti-Virus products including ViRobot Expert 4.0, Advanced Server, Linux Server 2.0, and LiveCall allows remote attackers to overwrite arbitrary files via ".." sequences in filenames contained in (1) ACE, (2) ARJ, (3) CAB, (4) LZH, (5) RAR, (6) TAR and (7) ZIP files. HAURI Anti-Virus产品,包括 ViRobot Expert 4.0、Advanced Server、Linux Server 2.0和LiveCall,存在目录遍历漏洞。这使得远程攻击者可以借助于包含在(1) ACE、(2)ARJ、(3)CAB、(4)LZH、(5)RAR、(6) TAR和 (7)ZIP文件中的文件名中的".."序列重写任意文件。
英文描述:
Directory traversal vulnerability in HAURI Anti-Virus products including ViRobot Expert 4.0, Advanced Server, Linux Server 2.0, and LiveCall allows remote attackers to overwrite arbitrary files via ".." sequences in filenames contained in (1) ACE, (2) ARJ, (3) CAB, (4) LZH, (5) RAR, (6) TAR and (7) ZIP files.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| hauri | livecall | * | - | - |
cpe:2.3:a:hauri:livecall:*:*:*:*:*:*:*:*
|
| hauri | virobot_advanced_server | * | - | - |
cpe:2.3:a:hauri:virobot_advanced_server:*:*:*:*:*:*:*:*
|
| hauri | virobot_expert | 4.0 | - | - |
cpe:2.3:a:hauri:virobot_expert:4.0:*:*:*:*:*:*:*
|
| hauri | virobot_linux_server | 2.0 | - | - |
cpe:2.3:a:hauri:virobot_linux_server:2.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
AV:N/AC:L/Au:N/C:N/I:P/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2005-2670 |
2025-11-11 15:17:35 | 2025-11-11 07:32:27 |
| NVD | nvd_CVE-2005-2670 |
2025-11-11 14:51:19 | 2025-11-11 07:41:13 |
| CNNVD | cnnvd_CNNVD-200508-238 |
2025-11-11 15:08:48 | 2025-11-11 07:49:00 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 路径遍历
- cnnvd_id: 未提取 -> CNNVD-200508-238
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:N/I:P/A:N
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 4
- data_sources: ['cve'] -> ['cve', 'nvd']