Page 3 of 12 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

dpkg 1.9.21 does not properly reset the metadata of a file during replacement of the file in a package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid file, (2) setgid file, or (3) device, a related issue to CVE-2010-2059. dpkg v1.9.21 no resetea adecuadamente el metadato de un fichero durante el reemplazamiento del fichero en una paquete de actualización, lo que puede permitir a usuarios locales obtener privelgeios crando un enlace fuerte en un fichero vulnerable (1) setuid, (2) fiechero setgid, o (3) device, un tema relacionado con CVE-2010-2059. • http://lists.jammed.com/ISN/2003/12/0056.html http://www.hackinglinuxexposed.com/articles/20031214.html https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=225692 https://bugzilla.redhat.com/show_bug.cgi?id=598775 https://exchange.xforce.ibmcloud.com/vulnerabilities/59428 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.8EPSS: 0%CPEs: 95EXPL: 0

Directory traversal vulnerability in the dpkg-source component in dpkg before 1.14.29 allows remote attackers to modify arbitrary files via a crafted Debian source archive. Vulnerabilidad de salto de directorio en el componente dpkg-source de dpkg en versiones anteriores a la v1.14.29 permite a usuarios remotos modificar ficheros de su elección a través de archivos fuente Debian modificados. • http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz http://www.debian.org/security/2010/dsa-2011 http://www.vupen.com/english/advisories/2010/0582 https://exchange.xforce.ibmcloud.com/vulnerabilities/56887 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •