CVE-2010-0831

EUVD-2010-0856
Directory traversal vulnerability in the extract_jar function in jartool.c in FastJar 0.98 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in a non-initial pathname component in a filename within a .jar archive, a related issue to CVE-2005-1080.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-3619.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
Affected Products (NVD)
VendorProductVersion
matthias_klosefastjar
0.98
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
fastjar
bookworm
2:0.98-7
fixed
bullseye
2:0.98-7
fixed
lenny
no-dsa
sid
2:0.98-7
fixed
trixie
2:0.98-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
fastjar
dapper
dne
hardy
Fixed 2:0.95-1ubuntu2.1
released
jaunty
Fixed 2:0.97-3ubuntu0.1
released
karmic
Fixed 2:0.98-1ubuntu0.9.10.1
released
lucid
Fixed 2:0.98-1ubuntu0.10.04.1
released
References