Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2010-1679

Disclosure Date: January 11, 2011
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Directory traversal vulnerability in dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via directory traversal sequences in a patch for a source-format 3.0 package.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • debian

Products

  • dpkg,
  • dpkg 1.10,
  • dpkg 1.10.1,
  • dpkg 1.10.10,
  • dpkg 1.10.11,
  • dpkg 1.10.12,
  • dpkg 1.10.13,
  • dpkg 1.10.14,
  • dpkg 1.10.15,
  • dpkg 1.10.16,
  • dpkg 1.10.17,
  • dpkg 1.10.18,
  • dpkg 1.10.18.1,
  • dpkg 1.10.19,
  • dpkg 1.10.2,
  • dpkg 1.10.20,
  • dpkg 1.10.21,
  • dpkg 1.10.22,
  • dpkg 1.10.23,
  • dpkg 1.10.24,
  • dpkg 1.10.25,
  • dpkg 1.10.26,
  • dpkg 1.10.27,
  • dpkg 1.10.28,
  • dpkg 1.10.3,
  • dpkg 1.10.4,
  • dpkg 1.10.5,
  • dpkg 1.10.6,
  • dpkg 1.10.7,
  • dpkg 1.10.8,
  • dpkg 1.10.9,
  • dpkg 1.13.0,
  • dpkg 1.13.1,
  • dpkg 1.13.10,
  • dpkg 1.13.11,
  • dpkg 1.13.11.1,
  • dpkg 1.13.12,
  • dpkg 1.13.13,
  • dpkg 1.13.14,
  • dpkg 1.13.15,
  • dpkg 1.13.16,
  • dpkg 1.13.17,
  • dpkg 1.13.18,
  • dpkg 1.13.19,
  • dpkg 1.13.2,
  • dpkg 1.13.20,
  • dpkg 1.13.21,
  • dpkg 1.13.22,
  • dpkg 1.13.23,
  • dpkg 1.13.24,
  • dpkg 1.13.25,
  • dpkg 1.13.3,
  • dpkg 1.13.4,
  • dpkg 1.13.5,
  • dpkg 1.13.6,
  • dpkg 1.13.7,
  • dpkg 1.13.8,
  • dpkg 1.13.9,
  • dpkg 1.14.0,
  • dpkg 1.14.1,
  • dpkg 1.14.10,
  • dpkg 1.14.11,
  • dpkg 1.14.12,
  • dpkg 1.14.13,
  • dpkg 1.14.14,
  • dpkg 1.14.15,
  • dpkg 1.14.16,
  • dpkg 1.14.16.1,
  • dpkg 1.14.16.2,
  • dpkg 1.14.16.3,
  • dpkg 1.14.16.4,
  • dpkg 1.14.16.5,
  • dpkg 1.14.16.6,
  • dpkg 1.14.17,
  • dpkg 1.14.18,
  • dpkg 1.14.19,
  • dpkg 1.14.2,
  • dpkg 1.14.20,
  • dpkg 1.14.21,
  • dpkg 1.14.22,
  • dpkg 1.14.23,
  • dpkg 1.14.24,
  • dpkg 1.14.25,
  • dpkg 1.14.26,
  • dpkg 1.14.27,
  • dpkg 1.14.28,
  • dpkg 1.14.29,
  • dpkg 1.14.3,
  • dpkg 1.14.4,
  • dpkg 1.14.5,
  • dpkg 1.14.6,
  • dpkg 1.14.7,
  • dpkg 1.14.8,
  • dpkg 1.14.9,
  • dpkg 1.15.0,
  • dpkg 1.15.1,
  • dpkg 1.15.2,
  • dpkg 1.15.3,
  • dpkg 1.15.3.1,
  • dpkg 1.15.4,
  • dpkg 1.15.4.1,
  • dpkg 1.15.5,
  • dpkg 1.15.5.1,
  • dpkg 1.15.5.2,
  • dpkg 1.15.5.3,
  • dpkg 1.15.5.4,
  • dpkg 1.15.5.5,
  • dpkg 1.15.5.6,
  • dpkg 1.15.6,
  • dpkg 1.15.6.1,
  • dpkg 1.15.7,
  • dpkg 1.15.7.1,
  • dpkg 1.15.7.2,
  • dpkg 1.15.8,
  • dpkg 1.15.8.1,
  • dpkg 1.15.8.2,
  • dpkg 1.15.8.3,
  • dpkg 1.15.8.4,
  • dpkg 1.15.8.5,
  • dpkg 1.15.8.6,
  • dpkg 1.15.8.7,
  • dpkg 1.15.8.8,
  • dpkg 1.9.19,
  • dpkg 1.9.20,
  • dpkg 1.9.21
Technical Analysis