Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201405292136.s4TLaJfo000730@linus.mitre.org>
Date: Thu, 29 May 2014 17:36:19 -0400 (EDT)
From: cve-assign@...re.org
To: geissert@...ian.org, guillem@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: another path traversal in dpkg-source during unpack

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Another path traversal was discovered

The short answer is that bug 746498 is CVE-2014-3864, and bug 749183
is CVE-2014-3865. We can also, first, review the status of the CVEs
related to our 1 May 2014 message. The proposed CVE mappings for all
four of these CVEs are indicated below; these would potentially start
to be processed for the cve.mitre.org web site as early as today.


CVE-2014-3127 (revised CVE description to be published at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3127 soon):

dpkg 1.15.9 on Debian squeeze introduces support for the "C-style
encoded filenames" feature without recognizing that the squeeze patch
program lacks this feature, which triggers an interaction error that
allows remote attackers to conduct directory traversal attacks and
modify files outside of the intended directories via a crafted source
package. NOTE: this can be considered a release engineering problem in
the effort to fix CVE-2014-0471.



CVE-2014-3227 (new CVE to be published at
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3227 and
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3227 soon):

dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect
the patch program to be compliant with a need for the "C-style encoded
filenames" feature, but is supported in environments with noncompliant
patch programs, which triggers an interaction error that allows remote
attackers to conduct directory traversal attacks and modify files
outside of the intended directories via a crafted source package.
NOTE: this vulnerability exists because of reliance on unrealistic
constraints on the behavior of an external program.



CVE-2014-3864 (new CVE to be published at
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3864 and
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3864 soon):

(reference is
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746498)

Directory traversal vulnerability in dpkg-source 1.3.0 allows remote
attackers to modify files outside of the intended directories via a
crafted source package that lacks a --- header line.



CVE-2014-3865 (new CVE to be published at
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3865 and
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3865 soon):

(reference is
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=749183)

Multiple directory traversal vulnerabilities in dpkg-source 1.3.0
allow remote attackers to modify files outside of the intended
directories via a source package with a crafted Index: pseudo-header
in conjunction with (1) missing --- and +++ header lines or (2) a +++
header line with a blank pathname.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTh6enAAoJEKllVAevmvms6i8IAIahGPbHIJ3n35oJt0XiADnD
6UByicAe4TTLVlT/HMDYAAEqLcYz12IttOLzaO38F8SV4mb2OlQolCpRB7wM/5pb
B3KPjpMV8BWB5MhWi22bVE8Thna+cMlM565adnw1bUhoBcEh9d3Bsy8l8c8bhtDm
JMdcmFA5pubpJtbsjfBppq8rLTLg8+LKy9eS9KOG8SGgT7gl0rSehK1ueg04gPIo
h9f0dbYfkUPsylTFpClKumrNmUnQVhd6tpDCNj0Q4W/D1c2QxfQbPCM7KRYfL/KV
8Uutyf17KKGVh4aJ7XAJiaYhIIYm9CrJjPevP/DOWqIRoWQzb1FEeN2+8zzw1js=
=jt0J
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.