6.4
CVSSv2

CVE-2014-3227

Published: 30/05/2014 Updated: 24/06/2014
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

dpkg 1.15.9, 1.16.x prior to 1.16.14, and 1.17.x prior to 1.17.9 expect the patch program to be compliant with a need for the "C-style encoded filenames" feature, but is supported in environments with noncompliant patch programs, which triggers an interaction error that allows remote malicious users to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this vulnerability exists because of reliance on unrealistic constraints on the behavior of an external program.

Vulnerable Product Search on Vulmon Subscribe to Product

debian dpkg 1.16.0.1

debian dpkg 1.16.0.2

debian dpkg 1.16.0.3

debian dpkg 1.16.1

debian dpkg 1.16.7

debian dpkg 1.16.8

debian dpkg 1.16.9

debian dpkg 1.17.0

debian dpkg 1.16.12

debian dpkg 1.16.2

debian dpkg 1.16.3

debian dpkg 1.16.4

debian dpkg 1.16.4.1

debian dpkg 1.17.5

debian dpkg 1.17.6

debian dpkg 1.17.7

debian dpkg 1.17.8

debian dpkg 1.15.9

debian dpkg 1.16.1.2

debian dpkg 1.16.11

debian dpkg 1.16.4.3

debian dpkg 1.16.6

debian dpkg 1.17.1

debian dpkg 1.17.3

debian dpkg 1.16.0

debian dpkg 1.16.1.1

debian dpkg 1.16.10

debian dpkg 1.16.4.2

debian dpkg 1.16.5

debian dpkg 1.17.2

debian dpkg 1.17.4