Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Calendar)  >   vCAP Vendors:   Paul Smith Computer Services
vCAP Lets Remote Users Deny Service or Traverse the Directory
SecurityTracker Alert ID:  1016822
SecurityTracker URL:
CVE Reference:   CVE-2006-5033, CVE-2006-5034   (Links to External Site)
Updated:  Jun 3 2008
Original Entry Date:  Sep 11 2006
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information
Exploit Included:  Yes  
Version(s): 1.9.0 Beta and prior versions
Description:   Securma Massine of the MorX Security Research Team reported a vulnerability in vCAP. A remote user can cause denial of service conditions. A remote user can view files on the target system.

A remote user can send specially crafted data to cause denial of service conditions.

A demonstration exploit URL is provided:


The software does not properly validate user-supplied input. A remote user can supply a specially crafted request containing '../' directory traversal characters to view files on target system that are located outside of the intended directory. This can be exploited, for example, to obtain passwords in the 'vCAP.db' database file.

A demonstration exploit URL is provided:


The vendor was notified on August 16, 2006.

The original advisory is available at:

Impact:   A remote user can cause denial of service conditions.

A remote user can view files on the target system.

Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  vCAP calendar server Multiple vulnerabilities

title: vCAP calendar server Multiple vulnerability
Author: securma massine <>
MorX Security Research Team
Product info : vCAP ( a network calendar server for Windows. vCAP 
allows user to create calendars which can be viewed and modified by people on  network 
using a web browser.
Original Advisory/PoC :
Severity: Medium/High - user can remotely attack the server
Vulnerability Description:
v1: denial of service attack with a specific request
v2: directory traversal , any file on the system can be downloaded  ,especially vCAp's 
passwords  (vCAP.db)
Affected Software(s): vCAP calendar server 1.9.0 Beta and prior
Affected platform(s): Windows
Exploit/Proof of Concept:
Solution : ??
16/08/2006   initial vendor contact
17/08/2006   sending vulnerability details
31/08/2006   vulnerability confirmed

this entire document is for eductional, testing and demonstrating purpose only.The 
author do not have any responsibility for any malicious use of this advisory or proof 
of concept code.

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC