First published: Tue Feb 02 2010(Updated: )
Multiple directory traversal vulnerabilities in Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allow remote attackers to overwrite arbitrary files or obtain sensitive information via vectors involving (1) control field names, (2) control field values, and (3) control files of patch systems.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lintian | =1.23.0 | |
Lintian | =1.23.1 | |
Lintian | =1.23.2 | |
Lintian | =1.23.3 | |
Lintian | =1.23.4 | |
Lintian | =1.23.5 | |
Lintian | =1.23.6 | |
Lintian | =1.23.7 | |
Lintian | =1.23.8 | |
Lintian | =1.23.9 | |
Lintian | =1.23.10 | |
Lintian | =1.23.11 | |
Lintian | =1.23.12 | |
Lintian | =1.23.13 | |
Lintian | =1.23.14 | |
Lintian | =1.23.15 | |
Lintian | =1.23.16 | |
Lintian | =1.23.17 | |
Lintian | =1.23.18 | |
Lintian | =1.23.19 | |
Lintian | =1.23.20 | |
Lintian | =1.23.22 | |
Lintian | =1.23.23 | |
Lintian | =1.23.24 | |
Lintian | =1.23.25 | |
Lintian | =1.23.26 | |
Lintian | =1.23.27 | |
Lintian | =1.23.28 | |
Lintian | =1.24.0 | |
Lintian | =1.24.1 | |
Lintian | =1.24.2 | |
Lintian | =2.0-rc1 | |
Lintian | =2.0-rc2 | |
Lintian | =2.1.0 | |
Lintian | =2.1.1 | |
Lintian | =2.1.2 | |
Lintian | =2.1.3 | |
Lintian | =2.1.4 | |
Lintian | =2.1.5 | |
Lintian | =2.1.6 | |
Lintian | =2.2.0 | |
Lintian | =2.2.1 | |
Lintian | =2.2.2 | |
Lintian | =2.2.3 | |
Lintian | =2.2.4 | |
Lintian | =2.2.5 | |
Lintian | =2.2.6 | |
Lintian | =2.2.7 | |
Lintian | =2.2.8 | |
Lintian | =2.2.9 | |
Lintian | =2.2.10 | |
Lintian | =2.2.11 | |
Lintian | =2.2.12 | |
Lintian | =2.2.13 | |
Lintian | =2.2.14 | |
Lintian | =2.2.15 | |
Lintian | =2.2.16 | |
Lintian | =2.2.18 | |
Lintian | =2.3.0 | |
Lintian | =2.3.1 | |
Lintian | >=1.23.0<=1.23.28 | |
Lintian | >=1.24.0<=1.24.2.1 | |
Lintian | >=2.0.0<2.3.2 | |
Debian Linux | =4.0 | |
Debian Linux | =5.0 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-4013 is classified as high due to the potential for remote attackers to overwrite files or access sensitive information.
To fix CVE-2009-4013, update Lintian to version 2.3.2 or later, as this version addresses the vulnerabilities.
CVE-2009-4013 affects Lintian versions 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and all 2.x versions prior to 2.3.2.
CVE-2009-4013 involves multiple directory traversal vulnerabilities that allow for file overwriting and unauthorized access to sensitive data.
Yes, CVE-2009-4013 can be exploited remotely when the affected versions of Lintian are exposed to untrusted input.