Multiple Vendor I/O System Call File...

- AV AC AU C I A
发布: 2003-04-04
修订: 2025-04-13

A weakness has been discovered on various systems that may result in an attacker gaining information pertaining to the existence of inaccessible files. The problem lies in the return times when attempting to access existent and non-existent files. By making requests for various files, it may be possible for an attacker to deduce whether the file exists, by examining the amount of time it takes for an error to be returned.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息