Computer Security
[EN] securityvulns.ru no-pyccku


dpkg directory traversal
Published:13.06.2014
Source:
SecurityVulns ID:13825
Type:remote
Threat Level:
6/10
Affected:DPKG : dpkg-dev 1.3
CVE:CVE-2014-3865 (Multiple directory traversal vulnerabilities in dpkg-source in dpkg-dev 1.3.0 allow remote attackers to modify files outside of the intended directories via a source package with a crafted Index: pseudo-header in conjunction with (1) missing --- and +++ header lines or (2) a +++ header line with a blank pathname.)
 CVE-2014-3864 (Directory traversal vulnerability in dpkg-source in dpkg-dev 1.3.0 allows remote attackers to modify files outside of the intended directories via a crafted source package that lacks a --- header line.)
 CVE-2014-3127 (dpkg 1.15.9 on Debian squeeze introduces support for the "C-style encoded filenames" feature without recognizing that the squeeze patch program lacks this feature, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this can be considered a release engineering problem in the effort to fix CVE-2014-0471.)
Original documentdocumentcve-assign_(at)_mitre.org, [oss-security] Re: CVE request: another path traversal in dpkg-source during unpack (13.06.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod