dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect the patch program to be compliant with a need for the "C-style encoded filenames" feature, but is supported in environments with noncompliant patch programs, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this vulnerability exists because of reliance on unrealistic constraints on the behavior of an external program.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2014-05-30T18:00:00

Updated: 2014-05-30T18:57:00

Reserved: 2014-05-06T00:00:00


Link: CVE-2014-3227

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2014-05-30T18:55:05.960

Modified: 2014-06-24T15:55:07.690


Link: CVE-2014-3227

JSON object: View

cve-icon Redhat Information

No data.

CWE