CVE-2014-3227

EUVD-2014-3243
dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect the patch program to be compliant with a need for the "C-style encoded filenames" feature, but is supported in environments with noncompliant patch programs, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this vulnerability exists because of reliance on unrealistic constraints on the behavior of an external program.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.4 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 69%
Affected Products (NVD)
VendorProductVersion
debiandpkg
1.15.9
debiandpkg
1.16.0
debiandpkg
1.16.0.1
debiandpkg
1.16.0.2
debiandpkg
1.16.0.3
debiandpkg
1.16.1
debiandpkg
1.16.1.1
debiandpkg
1.16.1.2
debiandpkg
1.16.2
debiandpkg
1.16.3
debiandpkg
1.16.4
debiandpkg
1.16.4.1
debiandpkg
1.16.4.2
debiandpkg
1.16.4.3
debiandpkg
1.16.5
debiandpkg
1.16.6
debiandpkg
1.16.7
debiandpkg
1.16.8
debiandpkg
1.16.9
debiandpkg
1.16.10
debiandpkg
1.16.11
debiandpkg
1.16.12
debiandpkg
1.17.0
debiandpkg
1.17.1
debiandpkg
1.17.2
debiandpkg
1.17.3
debiandpkg
1.17.4
debiandpkg
1.17.5
debiandpkg
1.17.6
debiandpkg
1.17.7
debiandpkg
1.17.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dpkg
bookworm
1.21.22
fixed
bullseye
1.20.13
fixed
bullseye (security)
1.20.10
fixed
sid
1.22.11
fixed
trixie
1.22.11
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dpkg
lucid
Fixed 1.15.5.6ubuntu4.8
released
precise
Fixed 1.16.1.2ubuntu7.4
released
saucy
Fixed 1.16.7ubuntu6.2
released
trusty
Fixed 1.16.12ubuntu1.2
released