First published: Mon Jan 12 2015(Updated: )
GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/patch | <2.7.4 | 2.7.4 |
debian/patch | 2.7.6-7 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.2 | |
GNU Patch | =2.7.1 |
http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1196 is considered a medium severity vulnerability due to its potential to allow unauthorized file write access.
To fix CVE-2015-1196, upgrade the GNU patch utility to version 2.7.4 or later, or apply the necessary patches provided by your distribution.
CVE-2015-1196 affects versions of GNU patch up to 2.7.4, including distributions like Red Hat, Debian, openSUSE, and Oracle Solaris.
CVE-2015-1196 is exploited through a symlink attack, allowing remote attackers to overwrite arbitrary files.
CVE-2015-1196 is classified as a remote vulnerability, enabling attackers to exploit it without physical access to the affected system.