Lucene search

K
cveMitreCVE-2010-0396
HistoryMar 15, 2010 - 1:28 p.m.

CVE-2010-0396

2010-03-1513:28:25
CWE-22
mitre
web.nvd.nist.gov
44
cve-2010-0396
directory traversal
vulnerability
dpkg
dpkg-source
debian
source archive

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

AI Score

6.4

Confidence

Low

EPSS

0.003

Percentile

70.3%

Directory traversal vulnerability in the dpkg-source component in dpkg before 1.14.29 allows remote attackers to modify arbitrary files via a crafted Debian source archive.

Affected configurations

Nvd
Node
debiandpkgRange1.14.28
OR
debiandpkgMatch1.9.19
OR
debiandpkgMatch1.9.20
OR
debiandpkgMatch1.9.21
OR
debiandpkgMatch1.10
OR
debiandpkgMatch1.10.1
OR
debiandpkgMatch1.10.2
OR
debiandpkgMatch1.10.3
OR
debiandpkgMatch1.10.4
OR
debiandpkgMatch1.10.5
OR
debiandpkgMatch1.10.6
OR
debiandpkgMatch1.10.7
OR
debiandpkgMatch1.10.8
OR
debiandpkgMatch1.10.9
OR
debiandpkgMatch1.10.10
OR
debiandpkgMatch1.10.11
OR
debiandpkgMatch1.10.12
OR
debiandpkgMatch1.10.13
OR
debiandpkgMatch1.10.14
OR
debiandpkgMatch1.10.15
OR
debiandpkgMatch1.10.16
OR
debiandpkgMatch1.10.17
OR
debiandpkgMatch1.10.18
OR
debiandpkgMatch1.10.18.1
OR
debiandpkgMatch1.10.19
OR
debiandpkgMatch1.10.20
OR
debiandpkgMatch1.10.21
OR
debiandpkgMatch1.10.22
OR
debiandpkgMatch1.10.23
OR
debiandpkgMatch1.10.24
OR
debiandpkgMatch1.10.25
OR
debiandpkgMatch1.10.26
OR
debiandpkgMatch1.10.27
OR
debiandpkgMatch1.10.28
OR
debiandpkgMatch1.13.0
OR
debiandpkgMatch1.13.1
OR
debiandpkgMatch1.13.2
OR
debiandpkgMatch1.13.3
OR
debiandpkgMatch1.13.4
OR
debiandpkgMatch1.13.5
OR
debiandpkgMatch1.13.6
OR
debiandpkgMatch1.13.7
OR
debiandpkgMatch1.13.8
OR
debiandpkgMatch1.13.9
OR
debiandpkgMatch1.13.10
OR
debiandpkgMatch1.13.11
OR
debiandpkgMatch1.13.11.1
OR
debiandpkgMatch1.13.12
OR
debiandpkgMatch1.13.13
OR
debiandpkgMatch1.13.14
OR
debiandpkgMatch1.13.15
OR
debiandpkgMatch1.13.16
OR
debiandpkgMatch1.13.17
OR
debiandpkgMatch1.13.18
OR
debiandpkgMatch1.13.19
OR
debiandpkgMatch1.13.20
OR
debiandpkgMatch1.13.21
OR
debiandpkgMatch1.13.22
OR
debiandpkgMatch1.13.23
OR
debiandpkgMatch1.13.24
OR
debiandpkgMatch1.13.25
OR
debiandpkgMatch1.14.0
OR
debiandpkgMatch1.14.1
OR
debiandpkgMatch1.14.2
OR
debiandpkgMatch1.14.3
OR
debiandpkgMatch1.14.4
OR
debiandpkgMatch1.14.5
OR
debiandpkgMatch1.14.6
OR
debiandpkgMatch1.14.7
OR
debiandpkgMatch1.14.8
OR
debiandpkgMatch1.14.9
OR
debiandpkgMatch1.14.10
OR
debiandpkgMatch1.14.11
OR
debiandpkgMatch1.14.12
OR
debiandpkgMatch1.14.13
OR
debiandpkgMatch1.14.14
OR
debiandpkgMatch1.14.15
OR
debiandpkgMatch1.14.16
OR
debiandpkgMatch1.14.16.1
OR
debiandpkgMatch1.14.16.2
OR
debiandpkgMatch1.14.16.3
OR
debiandpkgMatch1.14.16.4
OR
debiandpkgMatch1.14.16.5
OR
debiandpkgMatch1.14.16.6
OR
debiandpkgMatch1.14.17
OR
debiandpkgMatch1.14.18
OR
debiandpkgMatch1.14.19
OR
debiandpkgMatch1.14.20
OR
debiandpkgMatch1.14.21
OR
debiandpkgMatch1.14.22
OR
debiandpkgMatch1.14.23
OR
debiandpkgMatch1.14.24
OR
debiandpkgMatch1.14.25
OR
debiandpkgMatch1.14.26
OR
debiandpkgMatch1.14.27
VendorProductVersionCPE
debiandpkg*cpe:2.3:a:debian:dpkg:*:*:*:*:*:*:*:*
debiandpkg1.9.19cpe:2.3:a:debian:dpkg:1.9.19:*:*:*:*:*:*:*
debiandpkg1.9.20cpe:2.3:a:debian:dpkg:1.9.20:*:*:*:*:*:*:*
debiandpkg1.9.21cpe:2.3:a:debian:dpkg:1.9.21:*:*:*:*:*:*:*
debiandpkg1.10cpe:2.3:a:debian:dpkg:1.10:*:*:*:*:*:*:*
debiandpkg1.10.1cpe:2.3:a:debian:dpkg:1.10.1:*:*:*:*:*:*:*
debiandpkg1.10.2cpe:2.3:a:debian:dpkg:1.10.2:*:*:*:*:*:*:*
debiandpkg1.10.3cpe:2.3:a:debian:dpkg:1.10.3:*:*:*:*:*:*:*
debiandpkg1.10.4cpe:2.3:a:debian:dpkg:1.10.4:*:*:*:*:*:*:*
debiandpkg1.10.5cpe:2.3:a:debian:dpkg:1.10.5:*:*:*:*:*:*:*
Rows per page:
1-10 of 951

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

AI Score

6.4

Confidence

Low

EPSS

0.003

Percentile

70.3%