Directory Traversal Affecting perl package, versions <5.10.0-19
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
0.92% (83rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-PERL-327805
- published 2 Nov 2007
- disclosed 2 Nov 2007
How to fix?
Upgrade Debian:10
perl
to version 5.10.0-19 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream perl
package and not the perl
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has ".." sequences.
References
- https://security-tracker.debian.org/tracker/CVE-2007-4829
- https://issues.rpath.com/browse/RPL-1716
- http://www.gentoo.org/security/en/glsa/glsa-200812-10.xml
- http://rt.cpan.org/Public/Bug/Display.html?id=29517
- http://rt.cpan.org/Public/Bug/Display.html?id=30380
- http://osvdb.org/40410
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11658
- https://bugzilla.redhat.com/show_bug.cgi?id=295021
- http://secunia.com/advisories/27539
- http://secunia.com/advisories/33116
- http://secunia.com/advisories/33314
- http://www.securityfocus.com/bid/26355
- http://www.ubuntu.com/usn/usn-700-1
- http://www.ubuntu.com/usn/usn-700-2
- http://www.vupen.com/english/advisories/2007/3755
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38285