Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-8283

Опубликовано: 26 апр. 2017
Источник: debian
EPSS Низкий

Описание

dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dpkgfixed1.18.24package

Примечания

  • https://www.openwall.com/lists/oss-security/2017/04/20/2

EPSS

Процентиль: 77%
0.01076
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.

CVSS3: 9.8
nvd
почти 9 лет назад

dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.

CVSS3: 9.8
github
больше 3 лет назад

dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.

EPSS

Процентиль: 77%
0.01076
Низкий