CVE-2012-2241

scripts/dget.pl in devscripts before 2.12.3 allows remote attackers to delete arbitrary files via a crafted (1) .dsc or (2) .changes file, probably related to a NULL byte in a filename.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.8.14:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.9.21:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.9.22:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.9.23:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.9.24:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.9.25:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch1:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch2:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch4:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch5:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.9.27:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.0:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.3:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.4:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.5:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.6:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.7:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.8:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.11.9:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.12.0:*:*:*:*:*:*:*
cpe:2.3:a:devscripts_devel_team:devscripts:2.12.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:38

Type Values Removed Values Added
References () http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git%3Ba=commitdiff%3Bh=0fd15bdec07b085f9ef438dacd18e159ac60b810 - () http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git%3Ba=commitdiff%3Bh=0fd15bdec07b085f9ef438dacd18e159ac60b810 -
References () http://secunia.com/advisories/50600 - Vendor Advisory () http://secunia.com/advisories/50600 - Vendor Advisory
References () http://www.debian.org/security/2012/dsa-2549 - Vendor Advisory () http://www.debian.org/security/2012/dsa-2549 - Vendor Advisory
References () http://www.securityfocus.com/bid/55564 - () http://www.securityfocus.com/bid/55564 -
References () http://www.ubuntu.com/usn/USN-1593-1 - () http://www.ubuntu.com/usn/USN-1593-1 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/78977 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/78977 -

07 Nov 2023, 02:10

Type Values Removed Values Added
References
  • {'url': 'http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=0fd15bdec07b085f9ef438dacd18e159ac60b810', 'name': 'http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=0fd15bdec07b085f9ef438dacd18e159ac60b810', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git%3Ba=commitdiff%3Bh=0fd15bdec07b085f9ef438dacd18e159ac60b810 -

Information

Published : 2012-10-01 00:55

Updated : 2024-11-21 01:38


NVD link : CVE-2012-2241

Mitre link : CVE-2012-2241

CVE.ORG link : CVE-2012-2241


JSON object : View

Products Affected

devscripts_devel_team

  • devscripts
CWE
CWE-20

Improper Input Validation