ICONICS GENESIS SafeNet Sentinel Protection Server Directory Traversal
Description
A vulnerability has been identified in ICONICS GENESIS, which could be exploited by remote attackers to gain knowledge of sensitive information. This issue is caused by an input validation error in the SafeNet Sentinel Protection Server component when processing requests sent to port 6002/TCP, which could be exploited to conduct directory traversal attacks and disclose the contents of arbitrary files. For additional information, see : FrSIRT/ADV-2007-4011
Vulnerable Products
Vulnerable Software: ICONICS GENESIS64 version 10.51 and priorICONICS GENESIS32 version 9.21 and priorICONICS GENESIS32 version 8.05 and prior