Unknown
CVE-2017-8283
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- dpkg 1.10,
- dpkg 1.10.1,
- dpkg 1.10.10,
- dpkg 1.10.11,
- dpkg 1.10.12,
- dpkg 1.10.13,
- dpkg 1.10.14,
- dpkg 1.10.15,
- dpkg 1.10.16,
- dpkg 1.10.17,
- dpkg 1.10.18,
- dpkg 1.10.18.1,
- dpkg 1.10.19,
- dpkg 1.10.2,
- dpkg 1.10.20,
- dpkg 1.10.21,
- dpkg 1.10.22,
- dpkg 1.10.23,
- dpkg 1.10.24,
- dpkg 1.10.25,
- dpkg 1.10.26,
- dpkg 1.10.27,
- dpkg 1.10.28,
- dpkg 1.10.3,
- dpkg 1.10.4,
- dpkg 1.10.5,
- dpkg 1.10.6,
- dpkg 1.10.7,
- dpkg 1.10.8,
- dpkg 1.10.9,
- dpkg 1.13.0,
- dpkg 1.13.1,
- dpkg 1.13.10,
- dpkg 1.13.11,
- dpkg 1.13.11.1,
- dpkg 1.13.12,
- dpkg 1.13.13,
- dpkg 1.13.14,
- dpkg 1.13.15,
- dpkg 1.13.16,
- dpkg 1.13.17,
- dpkg 1.13.18,
- dpkg 1.13.19,
- dpkg 1.13.2,
- dpkg 1.13.20,
- dpkg 1.13.21,
- dpkg 1.13.22,
- dpkg 1.13.23,
- dpkg 1.13.24,
- dpkg 1.13.25,
- dpkg 1.13.3,
- dpkg 1.13.4,
- dpkg 1.13.5,
- dpkg 1.13.6,
- dpkg 1.13.7,
- dpkg 1.13.8,
- dpkg 1.13.9,
- dpkg 1.14.0,
- dpkg 1.14.1,
- dpkg 1.14.10,
- dpkg 1.14.11,
- dpkg 1.14.12,
- dpkg 1.14.13,
- dpkg 1.14.14,
- dpkg 1.14.15,
- dpkg 1.14.16,
- dpkg 1.14.16.1,
- dpkg 1.14.16.2,
- dpkg 1.14.16.3,
- dpkg 1.14.16.4,
- dpkg 1.14.16.5,
- dpkg 1.14.16.6,
- dpkg 1.14.17,
- dpkg 1.14.18,
- dpkg 1.14.19,
- dpkg 1.14.2,
- dpkg 1.14.20,
- dpkg 1.14.21,
- dpkg 1.14.22,
- dpkg 1.14.23,
- dpkg 1.14.24,
- dpkg 1.14.25,
- dpkg 1.14.3,
- dpkg 1.14.4,
- dpkg 1.14.5,
- dpkg 1.14.6,
- dpkg 1.14.7,
- dpkg 1.14.8,
- dpkg 1.14.9,
- dpkg 1.15.0,
- dpkg 1.15.1,
- dpkg 1.15.2,
- dpkg 1.15.3,
- dpkg 1.15.3.1,
- dpkg 1.15.4,
- dpkg 1.15.4.1,
- dpkg 1.15.5,
- dpkg 1.15.5.1,
- dpkg 1.15.5.2,
- dpkg 1.15.5.3,
- dpkg 1.15.5.4,
- dpkg 1.15.5.5,
- dpkg 1.15.5.6,
- dpkg 1.15.6,
- dpkg 1.15.6.1,
- dpkg 1.15.7,
- dpkg 1.15.7.1,
- dpkg 1.15.7.2,
- dpkg 1.15.8,
- dpkg 1.15.8.1,
- dpkg 1.15.8.10,
- dpkg 1.15.8.2,
- dpkg 1.15.8.3,
- dpkg 1.15.8.4,
- dpkg 1.15.8.5,
- dpkg 1.15.8.6,
- dpkg 1.15.8.7,
- dpkg 1.15.8.8,
- dpkg 1.15.8.9,
- dpkg 1.16.0,
- dpkg 1.16.0.1,
- dpkg 1.16.0.2,
- dpkg 1.16.0.3,
- dpkg 1.16.1,
- dpkg 1.16.1.1,
- dpkg 1.16.1.2,
- dpkg 1.16.10,
- dpkg 1.16.2,
- dpkg 1.16.3,
- dpkg 1.16.4,
- dpkg 1.16.4.1,
- dpkg 1.16.4.2,
- dpkg 1.16.4.3,
- dpkg 1.16.5,
- dpkg 1.16.6,
- dpkg 1.16.7,
- dpkg 1.16.8,
- dpkg 1.16.9,
- dpkg 1.17.0,
- dpkg 1.17.1,
- dpkg 1.17.10,
- dpkg 1.17.11,
- dpkg 1.17.12,
- dpkg 1.17.13,
- dpkg 1.17.14,
- dpkg 1.17.15,
- dpkg 1.17.16,
- dpkg 1.17.17,
- dpkg 1.17.18,
- dpkg 1.17.19,
- dpkg 1.17.2,
- dpkg 1.17.20,
- dpkg 1.17.21,
- dpkg 1.17.22,
- dpkg 1.17.23,
- dpkg 1.17.3,
- dpkg 1.17.4,
- dpkg 1.17.5,
- dpkg 1.17.6,
- dpkg 1.17.7,
- dpkg 1.17.8,
- dpkg 1.17.9,
- dpkg 1.18.0,
- dpkg 1.18.1,
- dpkg 1.18.10,
- dpkg 1.18.11,
- dpkg 1.18.12,
- dpkg 1.18.13,
- dpkg 1.18.14,
- dpkg 1.18.15,
- dpkg 1.18.16,
- dpkg 1.18.17,
- dpkg 1.18.18,
- dpkg 1.18.19,
- dpkg 1.18.2,
- dpkg 1.18.20,
- dpkg 1.18.21,
- dpkg 1.18.22,
- dpkg 1.18.23,
- dpkg 1.18.3,
- dpkg 1.18.4,
- dpkg 1.18.5,
- dpkg 1.18.6,
- dpkg 1.18.7,
- dpkg 1.18.8,
- dpkg 1.18.9,
- dpkg 1.3.0,
- dpkg 1.3.1,
- dpkg 1.3.10,
- dpkg 1.3.11,
- dpkg 1.3.12,
- dpkg 1.3.13,
- dpkg 1.3.14,
- dpkg 1.3.2,
- dpkg 1.3.3,
- dpkg 1.3.4,
- dpkg 1.3.5,
- dpkg 1.3.6,
- dpkg 1.3.7,
- dpkg 1.3.8,
- dpkg 1.3.9,
- dpkg 1.4.0,
- dpkg 1.4.0.1,
- dpkg 1.4.0.10,
- dpkg 1.4.0.11,
- dpkg 1.4.0.12,
- dpkg 1.4.0.13,
- dpkg 1.4.0.14,
- dpkg 1.4.0.15,
- dpkg 1.4.0.16,
- dpkg 1.4.0.17,
- dpkg 1.4.0.18,
- dpkg 1.4.0.19,
- dpkg 1.4.0.2,
- dpkg 1.4.0.20,
- dpkg 1.4.0.21,
- dpkg 1.4.0.22,
- dpkg 1.4.0.23,
- dpkg 1.4.0.23.1,
- dpkg 1.4.0.23.2,
- dpkg 1.4.0.24,
- dpkg 1.4.0.25,
- dpkg 1.4.0.26,
- dpkg 1.4.0.26.0.1,
- dpkg 1.4.0.27,
- dpkg 1.4.0.28,
- dpkg 1.4.0.29,
- dpkg 1.4.0.3,
- dpkg 1.4.0.30,
- dpkg 1.4.0.31,
- dpkg 1.4.0.4,
- dpkg 1.4.0.5,
- dpkg 1.4.0.6,
- dpkg 1.4.0.7,
- dpkg 1.4.0.8,
- dpkg 1.4.0.9,
- dpkg 1.4.1,
- dpkg 1.4.1.1,
- dpkg 1.4.1.10,
- dpkg 1.4.1.11,
- dpkg 1.4.1.12,
- dpkg 1.4.1.13,
- dpkg 1.4.1.14,
- dpkg 1.4.1.15,
- dpkg 1.4.1.16,
- dpkg 1.4.1.17,
- dpkg 1.4.1.18,
- dpkg 1.4.1.19,
- dpkg 1.4.1.2,
- dpkg 1.4.1.3,
- dpkg 1.4.1.4,
- dpkg 1.4.1.5,
- dpkg 1.4.1.6,
- dpkg 1.4.1.7,
- dpkg 1.4.1.8,
- dpkg 1.4.1.9,
- dpkg 1.6,
- dpkg 1.6.1,
- dpkg 1.6.10,
- dpkg 1.6.11,
- dpkg 1.6.12,
- dpkg 1.6.12.99,
- dpkg 1.6.13,
- dpkg 1.6.2,
- dpkg 1.6.3,
- dpkg 1.6.4,
- dpkg 1.6.5,
- dpkg 1.6.6,
- dpkg 1.6.7,
- dpkg 1.6.8,
- dpkg 1.6.9,
- dpkg 1.7.0,
- dpkg 1.7.1,
- dpkg 1.7.2,
- dpkg 1.8.0,
- dpkg 1.8.1,
- dpkg 1.8.1.1,
- dpkg 1.8.2,
- dpkg 1.8.3,
- dpkg 1.8.3.1,
- dpkg 1.9.0,
- dpkg 1.9.1,
- dpkg 1.9.10,
- dpkg 1.9.11,
- dpkg 1.9.12,
- dpkg 1.9.13,
- dpkg 1.9.14,
- dpkg 1.9.15,
- dpkg 1.9.16,
- dpkg 1.9.17,
- dpkg 1.9.18,
- dpkg 1.9.19,
- dpkg 1.9.2,
- dpkg 1.9.20,
- dpkg 1.9.21,
- dpkg 1.9.3,
- dpkg 1.9.4,
- dpkg 1.9.7,
- dpkg 1.9.8,
- dpkg 1.9.9
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: