Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title dpkg vulnerability
Informations
Name USN-2183-1 First vendor Publication 2014-04-28
Vendor Ubuntu Last vendor Modification 2014-04-28
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS - Ubuntu 13.10 - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS

Summary:

A malicious source package could write files outside the unpack directory.

Software Description: - dpkg: Debian package management system

Details:

Jakub Wilk discovered that dpkg incorrectly certain paths and symlinks when unpacking source packages. If a user or an automated system were tricked into unpacking a specially crafted source package, a remote attacker could modify files outside the target unpack directory, leading to a denial of service or potentially gaining access to the system.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS:
libdpkg-perl 1.17.5ubuntu5.1

Ubuntu 13.10:
libdpkg-perl 1.16.12ubuntu1.1

Ubuntu 12.10:
libdpkg-perl 1.16.7ubuntu6.1

Ubuntu 12.04 LTS:
libdpkg-perl 1.16.1.2ubuntu7.3

Ubuntu 10.04 LTS:
dpkg-dev 1.15.5.6ubuntu4.7

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2183-1
CVE-2014-0471

Package Information:
https://launchpad.net/ubuntu/+source/dpkg/1.17.5ubuntu5.1
https://launchpad.net/ubuntu/+source/dpkg/1.16.12ubuntu1.1
https://launchpad.net/ubuntu/+source/dpkg/1.16.7ubuntu6.1
https://launchpad.net/ubuntu/+source/dpkg/1.16.1.2ubuntu7.3
https://launchpad.net/ubuntu/+source/dpkg/1.15.5.6ubuntu4.7

Original Source

Url : http://www.ubuntu.com/usn/USN-2183-1

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:24816
 
Oval ID: oval:org.mitre.oval:def:24816
Title: USN-2183-2 -- dpkg vulnerability
Description: A malicious source package could write files outside the unpack directory.
Family: unix Class: patch
Reference(s): USN-2183-2
CVE-2014-0471
Version: 5
Platform(s): Ubuntu 14.04
Ubuntu 13.10
Ubuntu 12.10
Ubuntu 12.04
Ubuntu 10.04
Product(s): dpkg
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24819
 
Oval ID: oval:org.mitre.oval:def:24819
Title: USN-2183-1 -- dpkg vulnerability
Description: A malicious source package could write files outside the unpack directory.
Family: unix Class: patch
Reference(s): USN-2183-1
CVE-2014-0471
Version: 5
Platform(s): Ubuntu 14.04
Ubuntu 13.10
Ubuntu 12.10
Ubuntu 12.04
Ubuntu 10.04
Product(s): dpkg
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24869
 
Oval ID: oval:org.mitre.oval:def:24869
Title: DSA-2915-2 dpkg - security update
Description: Jakub Wilk discovered that dpkg did not correctly parse C-style filename quoting, allowing for paths to be traversed when unpacking a source package - leading to the creation of files outside the directory of the source being unpacked.
Family: unix Class: patch
Reference(s): DSA-2915-2
CVE-2014-0471
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): dpkg
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24876
 
Oval ID: oval:org.mitre.oval:def:24876
Title: DSA-2915-1 dpkg - security update
Description: Jakub Wilk discovered that dpkg did not correctly parse C-style filename quoting, allowing for paths to be traversed when unpacking a source package - leading to the creation of files outside the directory of the source being unpacked.
Family: unix Class: patch
Reference(s): DSA-2915-1
CVE-2014-0471
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): dpkg
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 267
Os 5

Nessus® Vulnerability Scanner

Date Description
2014-08-08 Name : The remote Fedora host is missing a security update.
File : fedora_2014-8564.nasl - Type : ACT_GATHER_INFO
2014-05-21 Name : The remote Fedora host is missing a security update.
File : fedora_2014-6277.nasl - Type : ACT_GATHER_INFO
2014-05-02 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2183-2.nasl - Type : ACT_GATHER_INFO
2014-04-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2915.nasl - Type : ACT_GATHER_INFO
2014-04-29 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2183-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2014-07-19 00:26:02
  • Multiple Updates
2014-05-03 13:22:46
  • Multiple Updates
2014-05-01 21:24:44
  • Multiple Updates
2014-05-01 13:28:37
  • Multiple Updates
2014-04-30 13:21:31
  • Multiple Updates
2014-04-28 17:18:38
  • First insertion