Directory Traversal Vulnerability in Dpkg Source for Debian Packages
CVE-2017-8283
9.8CRITICAL
Summary
The dpkg-source tool in dpkg versions 1.3.0 through 1.18.23 is susceptible to directory traversal attacks due to its ability to accept non-GNU patch programs and lack of protective mechanisms for blank-indented diff hunks. This flaw enables remote attackers to craft specific Debian source packages, potentially compromising the target system's file structure. An exploit could facilitate unauthorized access to sensitive files, highlighting the critical need for updated protections against such vulnerabilities.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved