First published: Fri May 30 2014(Updated: )
Multiple directory traversal vulnerabilities in dpkg-source in dpkg-dev 1.3.0 allow remote attackers to modify files outside of the intended directories via a source package with a crafted Index: pseudo-header in conjunction with (1) missing --- and +++ header lines or (2) a +++ header line with a blank pathname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
dpkg-dev | =1.3.0 | |
=1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3865 is considered a high-severity vulnerability due to its potential for remote exploitation.
To fix CVE-2014-3865, you should update dpkg-dev to a version that is not affected, ensuring you apply any available patches.
CVE-2014-3865 affects Debian's dpkg-dev version 1.3.0, specifically, but could impact systems using similar configurations.
CVE-2014-3865 is a directory traversal vulnerability that allows attackers to access files beyond the intended directory.
Yes, CVE-2014-3865 can be exploited remotely by sending a crafted source package to the affected system.