TITLE: Hyper Estraier Windows Unicode Filename Handling Vulnerability
SECUNIA ADVISORY ID: SA17379
VERIFY ADVISORY: http://secunia.com/advisories/17379/
CRITICAL: Less critical
IMPACT: Exposure of sensitive information, DoS
WHERE: >From remote
SOFTWARE: Hyper Estraier 1.x http://secunia.com/product/6017/
DESCRIPTION: A vulnerability has been reported in Hyper Estraier, which can be exploited by malicious users to cause a DoS (Denial of Service) or to gain knowledge of certain sensitive information.
The vulnerability is caused due to an error in handling files with certain unicode characters in their filenames when creating the index of a searchable directory. This can be exploited to cause files in non-searchable directories to be indexed, potentially disclosing their contents. It is also possible to cause a DoS by causing the index creation to fail via a file with a specially crafted unicode filename.
Successful exploitation requires that the malicious user is able to upload a file into a searchable directory.
The vulnerability affects only the Windows version.
SOLUTION: Update to version 1.0.2. http://hyperestraier.sourceforge.net/
PROVIDED AND/OR DISCOVERED BY: Yosuke Hasegawa
ORIGINAL ADVISORY: JP Vendor Status Notes (Japanese): http://jvn.jp/jp/JVN%2318282718/index.html
IPA (Japanese): http://www.ipa.go.jp/security/vuln/documents/2005/JVN_18282718_HyperEstraier.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.