Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-4668

Опубликовано: 18 июл. 2013
Источник: ubuntu
Приоритет: medium
CVSS2: 5

Описание

Directory traversal vulnerability in File Roller 3.6.x before 3.6.4, 3.8.x before 3.8.3, and 3.9.x before 3.9.3, when libarchive is used, allows remote attackers to create arbitrary files via a crafted archive that is not properly handled in a "Keep directory structure" action, related to fr-archive-libarchive.c and fr-window.c.

РелизСтатусПримечание
devel

not-affected

3.8.3-0ubuntu1
lucid

not-affected

2.30.1.1-0ubuntu2
precise

not-affected

3.4.1-0ubuntu1
quantal

released

3.6.1.1-0ubuntu1.2
raring

released

3.6.3-1ubuntu4.1
upstream

released

3.8.3-1

Показывать по

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

Directory traversal vulnerability in File Roller 3.6.x before 3.6.4, 3.8.x before 3.8.3, and 3.9.x before 3.9.3, when libarchive is used, allows remote attackers to create arbitrary files via a crafted archive that is not properly handled in a "Keep directory structure" action, related to fr-archive-libarchive.c and fr-window.c.

nvd
больше 12 лет назад

Directory traversal vulnerability in File Roller 3.6.x before 3.6.4, 3.8.x before 3.8.3, and 3.9.x before 3.9.3, when libarchive is used, allows remote attackers to create arbitrary files via a crafted archive that is not properly handled in a "Keep directory structure" action, related to fr-archive-libarchive.c and fr-window.c.

debian
больше 12 лет назад

Directory traversal vulnerability in File Roller 3.6.x before 3.6.4, 3 ...

github
больше 3 лет назад

Directory traversal vulnerability in File Roller 3.6.x before 3.6.4, 3.8.x before 3.8.3, and 3.9.x before 3.9.3, when libarchive is used, allows remote attackers to create arbitrary files via a crafted archive that is not properly handled in a "Keep directory structure" action, related to fr-archive-libarchive.c and fr-window.c.

5 Medium

CVSS2