Directory traversal vulnerability in dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via directory traversal sequences in a patch for a source-format 3.0 package.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://secunia.com/advisories/42831 | third party advisory vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053311.html | vendor advisory |
http://secunia.com/advisories/42826 | third party advisory vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053306.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64615 | vdb entry |
http://www.ubuntu.com/usn/USN-1038-1 | vendor advisory |
http://www.vupen.com/english/advisories/2011/0040 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/45703 | vdb entry |
http://www.debian.org/security/2011/dsa-2142 | vendor advisory |
http://osvdb.org/70368 | vdb entry |
http://secunia.com/advisories/43054 | third party advisory |
http://www.vupen.com/english/advisories/2011/0044 | vdb entry vendor advisory |
http://www.vupen.com/english/advisories/2011/0196 | vdb entry |