First published: Sun Jan 04 2015(Updated: )
Directory traversal vulnerability in the gcab_folder_extract function in libgcab/gcab-folder.c in gcab 0.4 allows remote attackers to write to arbitrary files via crafted path in a CAB file, as demonstrated by "\tmp\moo."
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gcab | 1.4-3 1.5-1 1.6-1 | |
GNOME libraries | =0.4 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0552 is a medium severity vulnerability that allows remote attackers to exploit a directory traversal issue.
To fix CVE-2015-0552, upgrade gcab to version 1.4-3, 1.5-1, or 1.6-1.
CVE-2015-0552 affects gcab version 0.4.
A directory traversal vulnerability allows attackers to write to arbitrary files on the server via crafted paths.
CVE-2015-0552 affects Debian and openSUSE distributions containing vulnerable versions of gcab.