First published: Wed Jan 05 2011(Updated: )
Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Patch | =2.5.4 | |
GNU Patch | <=2.6.1 | |
GNU Patch | =2.5.9 | |
GNU Patch | =2.6 | |
GNU Patch | =2.5 |
http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4651 has a medium severity rating due to the potential for remote attackers to exploit directory traversal vulnerabilities.
To fix CVE-2010-4651, update to GNU patch version 2.6.2 or later, which addresses this vulnerability.
CVE-2010-4651 affects GNU patch versions up to and including 2.6.1.
Yes, CVE-2010-4651 allows an attacker to create or overwrite arbitrary files using a crafted filename.
Yes, exploitation of CVE-2010-4651 requires user assistance to provide a specially crafted filename.