Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3227

Опубликовано: 30 мая 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.4

Описание

dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect the patch program to be compliant with a need for the "C-style encoded filenames" feature, but is supported in environments with noncompliant patch programs, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this vulnerability exists because of reliance on unrealistic constraints on the behavior of an external program.

РелизСтатусПримечание
devel

released

1.17.5ubuntu5.2
esm-infra-legacy/trusty

released

1.16.12ubuntu1.2
lucid

released

1.15.5.6ubuntu4.8
precise

released

1.16.1.2ubuntu7.4
saucy

released

1.16.7ubuntu6.2
trusty

released

1.16.12ubuntu1.2
trusty/esm

released

1.16.12ubuntu1.2
upstream

needs-triage

Показывать по

EPSS

Процентиль: 69%
0.00618
Низкий

6.4 Medium

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect the patch program to be compliant with a need for the "C-style encoded filenames" feature, but is supported in environments with noncompliant patch programs, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this vulnerability exists because of reliance on unrealistic constraints on the behavior of an external program.

debian
больше 11 лет назад

dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect th ...

github
больше 3 лет назад

dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect the patch program to be compliant with a need for the "C-style encoded filenames" feature, but is supported in environments with noncompliant patch programs, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this vulnerability exists because of reliance on unrealistic constraints on the behavior of an external program.

EPSS

Процентиль: 69%
0.00618
Низкий

6.4 Medium

CVSS2