[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80167

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2017-8283

Date: (C)2017-04-29   (M)2017-12-06 


dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.

CVSS Score: 7.5Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL





Reference:
BID-98064
http://www.openwall.com/lists/oss-security/2017/04/20/2

CPE    165
cpe:/a:debian:dpkg:1.15.8.10
cpe:/a:debian:dpkg:1.16.4.3
cpe:/a:debian:dpkg:1.16.4.1
cpe:/a:debian:dpkg:1.16.4.2
...
CWE    1
CWE-22

© 2013 SecPod Technologies