Vulnerability Bulletins |
Salto de directorio en aplicación Debian GNU/Linux Dpkg |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Aumento de la visibilidad |
Dificulty | Experto |
Required attacker level | Acceso remoto sin cuenta a un servicio estandar |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | Debian Dpkg |
Description |
|
Se ha descubierto una vulnerabilidad en la aplicación "dpkg" de Debian GNU/Linux. La vulnerabilidad reside en un error en el manejo de los scripts de instalación de paquetes. Un atacante remoto podría realizar ataques de salto de directorio mediante un paquete .deb especialmente diseñado. |
|
Solution |
|
Actualización de software Debian (DSA-2011-1) Debian Linux 5.0 Source http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.dsc http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz Arquitectura independiente: http://security.debian.org/pool/updates/main/d/dpkg/dpkg-dev_1.14.29_all.deb alpha (DEC Alpha) http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_alpha.deb http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_alpha.deb amd64 (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_amd64.deb http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_amd64.deb arm (ARM) http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_arm.deb http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_arm.deb armel (ARM EABI) http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_armel.deb http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_armel.deb hppa (HP PA RISC) http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_hppa.deb http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_hppa.deb i386 (Intel ia32) http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_i386.deb http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_i386.deb ia64 (Intel ia64) http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_ia64.deb http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_ia64.deb mips (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_mips.deb http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_mips.deb mipsel (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_mipsel.deb http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_mipsel.deb powerpc (PowerPC) http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_powerpc.deb http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_powerpc.deb s390 (IBM S/390) http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_s390.deb http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_s390.deb sparc (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_sparc.deb http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_sparc.deb |
|
Standar resources |
|
Property | Value |
CVE | CVE-2010-0396 |
BID | NULL |
Other resources |
|
Debian Security Advisory (DSA-2011-1) http://lists.debian.org/debian-security-announce/2010/msg00051.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2010-03-15 |