Lucene search

K
cveMitreCVE-2014-3127
HistoryMay 14, 2014 - 12:55 a.m.

CVE-2014-3127

2014-05-1400:55:10
CWE-22
mitre
web.nvd.nist.gov
31
dpkg
debian
squeeze
cve-2014-3127
directory traversal
remote attackers
release engineering
nvd
security vulnerability

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:N/I:C/A:C

AI Score

6.3

Confidence

Low

EPSS

0.012

Percentile

85.3%

dpkg 1.15.9 on Debian squeeze introduces support for the “C-style encoded filenames” feature without recognizing that the squeeze patch program lacks this feature, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this can be considered a release engineering problem in the effort to fix CVE-2014-0471.

Affected configurations

Nvd
Node
debiandpkgMatch1.16.0
OR
debiandpkgMatch1.16.0.1
OR
debiandpkgMatch1.16.0.2
OR
debiandpkgMatch1.16.0.3
OR
debiandpkgMatch1.16.1
OR
debiandpkgMatch1.16.1.1
OR
debiandpkgMatch1.16.1.2
OR
debiandpkgMatch1.16.2
OR
debiandpkgMatch1.16.3
OR
debiandpkgMatch1.16.4
OR
debiandpkgMatch1.16.4.1
OR
debiandpkgMatch1.16.4.2
OR
debiandpkgMatch1.16.4.3
OR
debiandpkgMatch1.16.5
OR
debiandpkgMatch1.16.6
OR
debiandpkgMatch1.16.7
OR
debiandpkgMatch1.16.8
OR
debiandpkgMatch1.16.9
OR
debiandpkgMatch1.16.10
OR
debiandpkgMatch1.16.11
OR
debiandpkgMatch1.16.12
Node
debiandpkgMatch1.17.0
OR
debiandpkgMatch1.17.1
OR
debiandpkgMatch1.17.2
OR
debiandpkgMatch1.17.3
OR
debiandpkgMatch1.17.4
OR
debiandpkgMatch1.17.5
OR
debiandpkgMatch1.17.6
OR
debiandpkgMatch1.17.7
OR
debiandpkgMatch1.17.8
Node
debiandpkgMatch1.15.0
OR
debiandpkgMatch1.15.1
OR
debiandpkgMatch1.15.2
OR
debiandpkgMatch1.15.3
OR
debiandpkgMatch1.15.3.1
OR
debiandpkgMatch1.15.4
OR
debiandpkgMatch1.15.4.1
OR
debiandpkgMatch1.15.5
OR
debiandpkgMatch1.15.5.1
OR
debiandpkgMatch1.15.5.2
OR
debiandpkgMatch1.15.5.3
OR
debiandpkgMatch1.15.5.4
OR
debiandpkgMatch1.15.5.5
OR
debiandpkgMatch1.15.5.6
OR
debiandpkgMatch1.15.6
OR
debiandpkgMatch1.15.6.1
OR
debiandpkgMatch1.15.7
OR
debiandpkgMatch1.15.7.1
OR
debiandpkgMatch1.15.7.2
OR
debiandpkgMatch1.15.8
OR
debiandpkgMatch1.15.8.1
OR
debiandpkgMatch1.15.8.2
OR
debiandpkgMatch1.15.8.3
OR
debiandpkgMatch1.15.8.4
OR
debiandpkgMatch1.15.8.5
OR
debiandpkgMatch1.15.8.6
OR
debiandpkgMatch1.15.8.7
OR
debiandpkgMatch1.15.8.8
OR
debiandpkgMatch1.15.8.9
OR
debiandpkgMatch1.15.8.10
OR
debiandpkgMatch1.15.8.11
OR
debiandpkgMatch1.15.8.12
OR
debiandpkgMatch1.15.8.13
OR
debiandpkgMatch1.15.9
VendorProductVersionCPE
debiandpkg1.16.0cpe:2.3:a:debian:dpkg:1.16.0:*:*:*:*:*:*:*
debiandpkg1.16.0.1cpe:2.3:a:debian:dpkg:1.16.0.1:*:*:*:*:*:*:*
debiandpkg1.16.0.2cpe:2.3:a:debian:dpkg:1.16.0.2:*:*:*:*:*:*:*
debiandpkg1.16.0.3cpe:2.3:a:debian:dpkg:1.16.0.3:*:*:*:*:*:*:*
debiandpkg1.16.1cpe:2.3:a:debian:dpkg:1.16.1:*:*:*:*:*:*:*
debiandpkg1.16.1.1cpe:2.3:a:debian:dpkg:1.16.1.1:*:*:*:*:*:*:*
debiandpkg1.16.1.2cpe:2.3:a:debian:dpkg:1.16.1.2:*:*:*:*:*:*:*
debiandpkg1.16.2cpe:2.3:a:debian:dpkg:1.16.2:*:*:*:*:*:*:*
debiandpkg1.16.3cpe:2.3:a:debian:dpkg:1.16.3:*:*:*:*:*:*:*
debiandpkg1.16.4cpe:2.3:a:debian:dpkg:1.16.4:*:*:*:*:*:*:*
Rows per page:
1-10 of 641

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:N/I:C/A:C

AI Score

6.3

Confidence

Low

EPSS

0.012

Percentile

85.3%