First published: Fri Jan 09 2015(Updated: )
Multiple directory traversal vulnerabilities in pigz 2.3.1 allow remote attackers to write to arbitrary files via a (1) full pathname or (2) .. (dot dot) in an archive.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/pigz | 2.6-1 2.8-1 | |
Pigz | =2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1191 is considered a high severity vulnerability due to potential unauthorized file access.
To fix CVE-2015-1191, update the pigz package to version 2.6-1 or later.
CVE-2015-1191 can be exploited by remote attackers to perform directory traversal attacks.
CVE-2015-1191 affects pigz version 2.3.1 and potentially earlier versions.
The permanent solution for CVE-2015-1191 is to apply the latest security patches provided for pigz.