dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect the patch program to be compliant with a need for the "C-style encoded filenames" feature, but is supported in environments with noncompliant patch programs, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this vulnerability exists because of reliance on unrealistic constraints on the behavior of an external program.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://openwall.com/lists/oss-security/2014/04/29/4 - | |
References | () http://openwall.com/lists/oss-security/2014/05/29/16 - | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306 - |
Information
Published : 2014-05-30 18:55
Updated : 2024-11-21 02:07
NVD link : CVE-2014-3227
Mitre link : CVE-2014-3227
CVE.ORG link : CVE-2014-3227
JSON object : View
Products Affected
debian
- dpkg
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')