7.5
CVSSv3

CVE-2015-1395

Published: 25/08/2017 Updated: 30/08/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:C/A:N

Vulnerability Summary

Directory traversal vulnerability in GNU patch versions which support Git-style patching prior to 2.7.3 allows remote malicious users to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fedoraproject fedora 20

fedoraproject fedora 21

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

canonical ubuntu linux 14.10

gnu patch

Vendor Advisories

Debian Bug report logs - #775873 patch: CVE-2015-1395: directory traversal via file rename Package: patch; Maintainer for patch is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for patch is src:patch (PTS, buildd, popcon) Reported by: Jakub Wilk <jwilk@debianorg> Date: Tue, 20 Jan 2015 22:51:01 UTC Severity: gr ...
Several security issues were fixed in GNU patch ...
Directory traversal vulnerability in GNU patch versions which support Git-style patching before 273 allows remote attackers to write to arbitrary files with the permissions of the target user via a (dot dot) in a diff file name ...