4.3
CVSSv3

CVE-2019-16680

Published: 21/09/2019 Updated: 20/12/2019
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Summary

An issue exists in GNOME file-roller prior to 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnome file-roller

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

debian debian linux 8.0

debian debian linux 9.0

redhat enterprise linux 7.0

redhat enterprise linux 8.0

Vendor Advisories

Synopsis Moderate: file-roller security update Type/Severity Security Advisory: Moderate Topic An update for file-roller is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base s ...
File Roller could be made to overwrite sensitive files if it received a specially crafted TAR file ...
It was discovered that file-roller, an archive manager for GNOME, does not properly handle the extraction of archives with a single // in a file path An attacker able to provide a specially crafted archive for processing can take advantage of this flaw to overwrite files if a user is dragging a specific file or map to a location to extract to ...