Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-1196

Опубликовано: 12 янв. 2015
Источник: redhat
CVSS2: 3.6
EPSS Низкий

Описание

GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.

Отчет

Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5patchNot affected
Red Hat Enterprise Linux 6patchNot affected
Red Hat Enterprise Linux 7patchWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1182154patch: directory traversal via symlinks

EPSS

Процентиль: 74%
0.00853
Низкий

3.6 Low

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.

nvd
около 11 лет назад

GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.

debian
около 11 лет назад

GNU patch 2.7.1 allows remote attackers to write to arbitrary files vi ...

github
больше 3 лет назад

GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.

suse-cvrf
больше 10 лет назад

Security update for patch

EPSS

Процентиль: 74%
0.00853
Низкий

3.6 Low

CVSS2