Directory Traversal Affecting elfutils package, versions <0.159-4.1
Threat Intelligence
EPSS
0.95% (84th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN8-ELFUTILS-322398
- published 2 Jan 2015
- disclosed 2 Jan 2015
How to fix?
Upgrade Debian:8 elfutils to version 0.159-4.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils package and not the elfutils package as distributed by Debian.
See How to fix? for Debian:8 relevant fixed versions and status.
Directory traversal vulnerability in the read_long_names function in libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers to write to arbitrary files to the root directory via a / (slash) in a crafted archive, as demonstrated using the ar program.
References
- https://security-tracker.debian.org/tracker/CVE-2014-9447
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148321.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148326.html
- http://advisories.mageia.org/MGASA-2015-0033.html
- https://git.fedorahosted.org/cgit/elfutils.git/commit/?id=147018e729e7c22eeabf15b82d26e4bf68a0d18e
- https://lists.fedorahosted.org/pipermail/elfutils-devel/2014-December/004499.html
- http://www.openwall.com/lists/oss-security/2014/12/29/2
- http://secunia.com/advisories/61934
- http://secunia.com/advisories/62560
- http://secunia.com/advisories/62661
- http://www.securityfocus.com/bid/71804
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9447
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:047
CVSS Scores
version 3.1