4.3
CVSSv2

CVE-2015-1196

Published: 21/01/2015 Updated: 30/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

GNU patch 2.7.1 allows remote malicious users to write to arbitrary files via a symlink attack in a patch file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opensuse opensuse 13.2

opensuse opensuse 13.1

oracle solaris 11.2

gnu patch 2.7.1

Vendor Advisories

Several security issues were fixed in GNU patch ...
Debian Bug report logs - #775227 patch: CVE-2015-1196: directory traversal via symlinks Package: patch; Maintainer for patch is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for patch is src:patch (PTS, buildd, popcon) Reported by: Jakub Wilk <jwilk@debianorg> Date: Mon, 12 Jan 2015 19:27:02 UTC Severity: norma ...
Debian Bug report logs - #775873 patch: CVE-2015-1395: directory traversal via file rename Package: patch; Maintainer for patch is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for patch is src:patch (PTS, buildd, popcon) Reported by: Jakub Wilk <jwilk@debianorg> Date: Tue, 20 Jan 2015 22:51:01 UTC Severity: gr ...
Debian Bug report logs - #775901 patch: CVE-2015-1396: another directory traversal via symlinks Package: patch; Maintainer for patch is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for patch is src:patch (PTS, buildd, popcon) Reported by: Jakub Wilk <jwilk@debianorg> Date: Wed, 21 Jan 2015 10:42:06 UTC Severit ...
GNU patch 271 allows remote attackers to write to arbitrary files via a symlink attack in a patch file ...