CVE-2014-3227

dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect the patch program to be compliant with a need for the "C-style encoded filenames" feature, but is supported in environments with noncompliant patch programs, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this vulnerability exists because of reliance on unrealistic constraints on the behavior of an external program.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.4 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 68%
VendorProductVersion
debiandpkg
1.15.9
debiandpkg
1.16.0
debiandpkg
1.16.0.1
debiandpkg
1.16.0.2
debiandpkg
1.16.0.3
debiandpkg
1.16.1
debiandpkg
1.16.1.1
debiandpkg
1.16.1.2
debiandpkg
1.16.2
debiandpkg
1.16.3
debiandpkg
1.16.4
debiandpkg
1.16.4.1
debiandpkg
1.16.4.2
debiandpkg
1.16.4.3
debiandpkg
1.16.5
debiandpkg
1.16.6
debiandpkg
1.16.7
debiandpkg
1.16.8
debiandpkg
1.16.9
debiandpkg
1.16.10
debiandpkg
1.16.11
debiandpkg
1.16.12
debiandpkg
1.17.0
debiandpkg
1.17.1
debiandpkg
1.17.2
debiandpkg
1.17.3
debiandpkg
1.17.4
debiandpkg
1.17.5
debiandpkg
1.17.6
debiandpkg
1.17.7
debiandpkg
1.17.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dpkg
bullseye
1.20.13
fixed
bullseye (security)
1.20.10
fixed
bookworm
1.21.22
fixed
sid
1.22.11
fixed
trixie
1.22.11
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dpkg
trusty
Fixed 1.16.12ubuntu1.2
released
saucy
Fixed 1.16.7ubuntu6.2
released
precise
Fixed 1.16.1.2ubuntu7.4
released
lucid
Fixed 1.15.5.6ubuntu4.8
released