Executive Summary
Summary | |
---|---|
Title | dpkg security update |
Informations | |||
---|---|---|---|
Name | DSA-2953 | First vendor Publication | 2014-06-08 |
Vendor | Debian | Last vendor Modification | 2014-06-08 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple vulnerabilities were discovered in dpkg that allow file modification through path traversal when unpacking source packages with especially-crafted patch files. This update had been scheduled before the end of security support for the oldstable distribution (squeeze), hence an exception has been made and was released through the security archive. However, no further updates should be expected. For the oldstable distribution (squeeze), these problems have been fixed in version 1.15.11. For the stable distribution (wheezy), these problems have been fixed in version 1.16.15. For the testing distribution (jessie), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version 1.17.10. We recommend that you upgrade your dpkg packages. |
Original Source
Url : http://www.debian.org/security/2014/dsa-2953 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:24151 | |||
Oval ID: | oval:org.mitre.oval:def:24151 | ||
Title: | USN-2242-1 -- dpkg vulnerabilities | ||
Description: | A malicious source package could write files outside the unpack directory. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2242-1 CVE-2014-3864 CVE-2014-3865 | Version: | 3 |
Platform(s): | Ubuntu 14.04 Ubuntu 13.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | dpkg |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24173 | |||
Oval ID: | oval:org.mitre.oval:def:24173 | ||
Title: | DSA-2953-1 dpkg - security update | ||
Description: | Multiple vulnerabilities were discovered in dpkg that allow file modification through path traversal when unpacking source packages with specially crafted patch files. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2953-1 CVE-2014-3864 CVE-2014-3865 | Version: | 3 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | dpkg |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-08-08 | Name : The remote Fedora host is missing a security update. File : fedora_2014-8564.nasl - Type : ACT_GATHER_INFO |
2014-07-21 | Name : The remote Fedora host is missing a security update. File : fedora_2014-7697.nasl - Type : ACT_GATHER_INFO |
2014-06-11 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2242-1.nasl - Type : ACT_GATHER_INFO |
2014-06-09 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2953.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-06-24 21:29:13 |
|
2014-06-10 13:25:37 |
|
2014-06-08 21:20:53 |
|