Directory traversal vulnerability in uupdate in devscripts 2.14.1 allows remote attackers to modify arbitrary files via a crafted .orig.tar file, related to a symlink.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2014/01/31/11 | mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=1059947 | vendor advisory |
http://www.securityfocus.com/bid/65260 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90842 | vdb entry |
http://www.openwall.com/lists/oss-security/2014/01/31/7 | mailing list |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737160 | |
http://www.ubuntu.com/usn/USN-2649-1 | vendor advisory |
http://osvdb.org/102748 | vdb entry |