cpe:/a:debian:lintian:1.23.0 cpe:/a:debian:lintian:1.23.1 cpe:/a:debian:lintian:1.23.2 cpe:/a:debian:lintian:1.23.3 cpe:/a:debian:lintian:1.23.4 cpe:/a:debian:lintian:1.23.5 cpe:/a:debian:lintian:1.23.6 cpe:/a:debian:lintian:1.23.7 cpe:/a:debian:lintian:1.23.8 cpe:/a:debian:lintian:1.23.9 cpe:/a:debian:lintian:1.23.10 cpe:/a:debian:lintian:1.23.11 cpe:/a:debian:lintian:1.23.12 cpe:/a:debian:lintian:1.23.13 cpe:/a:debian:lintian:1.23.14 cpe:/a:debian:lintian:1.23.15 cpe:/a:debian:lintian:1.23.16 cpe:/a:debian:lintian:1.23.17 cpe:/a:debian:lintian:1.23.18 cpe:/a:debian:lintian:1.23.19 cpe:/a:debian:lintian:1.23.20 cpe:/a:debian:lintian:1.23.22 cpe:/a:debian:lintian:1.23.23 cpe:/a:debian:lintian:1.23.24 cpe:/a:debian:lintian:1.23.25 cpe:/a:debian:lintian:1.23.26 cpe:/a:debian:lintian:1.23.27 cpe:/a:debian:lintian:1.23.28 cpe:/a:debian:lintian:1.24.0 cpe:/a:debian:lintian:1.24.1 cpe:/a:debian:lintian:1.24.2 cpe:/a:debian:lintian:2.0-rc1 cpe:/a:debian:lintian:2.0-rc2 cpe:/a:debian:lintian:2.1.0 cpe:/a:debian:lintian:2.1.1 cpe:/a:debian:lintian:2.1.2 cpe:/a:debian:lintian:2.1.3 cpe:/a:debian:lintian:2.1.4 cpe:/a:debian:lintian:2.1.5 cpe:/a:debian:lintian:2.1.6 cpe:/a:debian:lintian:2.2.0 cpe:/a:debian:lintian:2.2.1 cpe:/a:debian:lintian:2.2.2 cpe:/a:debian:lintian:2.2.3 cpe:/a:debian:lintian:2.2.4 cpe:/a:debian:lintian:2.2.5 cpe:/a:debian:lintian:2.2.6 cpe:/a:debian:lintian:2.2.7 cpe:/a:debian:lintian:2.2.8 cpe:/a:debian:lintian:2.2.9 cpe:/a:debian:lintian:2.2.10 cpe:/a:debian:lintian:2.2.11 cpe:/a:debian:lintian:2.2.12 cpe:/a:debian:lintian:2.2.13 cpe:/a:debian:lintian:2.2.14 cpe:/a:debian:lintian:2.2.15 cpe:/a:debian:lintian:2.2.16 cpe:/a:debian:lintian:2.2.18 cpe:/a:debian:lintian:2.3.0 cpe:/a:debian:lintian:2.3.1 CVE-2009-4013 2010-02-02T11:30:02.233-05:00 2010-02-03T00:00:00.000-05:00 7.5 NETWORK LOW NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2010-02-03T09:52:00.000-05:00 BID 37975 SECUNIA 38375 SECUNIA 38379 DEBIAN DSA-1979 UBUNTU USN-891-1 MLIST [debian-changes] 20100128 Accepted lintian 1.24.2.1+lenny1 (source all) CONFIRM http://git.debian.org/?p=lintian/lintian.git;a=commit;h=c8d01f062b3e5137cf65196760b079a855c75e00 CONFIRM http://git.debian.org/?p=lintian/lintian.git;a=commit;h=fbe0c92b2ef7e360d13414bf40d6af5507d0c86d CONFIRM http://packages.debian.org/changelogs/pool/main/l/lintian/lintian_2.3.2/changelog Multiple directory traversal vulnerabilities in Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allow remote attackers to overwrite arbitrary files or obtain sensitive information via vectors involving (1) control field names, (2) control field values, and (3) control files of patch systems.