cve-2010-0396
Vulnerability from cvelistv5
Published
2010-03-12 20:00
Modified
2024-08-07 00:45
Severity ?
Summary
Directory traversal vulnerability in the dpkg-source component in dpkg before 1.14.29 allows remote attackers to modify arbitrary files via a crafted Debian source archive.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:45:12.234Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2011",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-2011"
          },
          {
            "name": "dpkg-dpkgsource-dir-traversal(56887)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56887"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz"
          },
          {
            "name": "ADV-2010-0582",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0582"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-03-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the dpkg-source component in dpkg before 1.14.29 allows remote attackers to modify arbitrary files via a crafted Debian source archive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-2011",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-2011"
        },
        {
          "name": "dpkg-dpkgsource-dir-traversal(56887)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56887"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz"
        },
        {
          "name": "ADV-2010-0582",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0582"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-0396",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the dpkg-source component in dpkg before 1.14.29 allows remote attackers to modify arbitrary files via a crafted Debian source archive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-2011",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2010/dsa-2011"
            },
            {
              "name": "dpkg-dpkgsource-dir-traversal(56887)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56887"
            },
            {
              "name": "http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz",
              "refsource": "CONFIRM",
              "url": "http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz"
            },
            {
              "name": "ADV-2010-0582",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0582"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-0396",
    "datePublished": "2010-03-12T20:00:00",
    "dateReserved": "2010-01-27T00:00:00",
    "dateUpdated": "2024-08-07T00:45:12.234Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2010-0396\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-03-15T13:28:25.747\",\"lastModified\":\"2024-11-21T01:12:07.997\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in the dpkg-source component in dpkg before 1.14.29 allows remote attackers to modify arbitrary files via a crafted Debian source archive.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de salto de directorio en el componente dpkg-source de dpkg en versiones anteriores a la v1.14.29 permite a usuarios remotos modificar ficheros de su elecci\u00f3n a trav\u00e9s de archivos fuente Debian modificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:P\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.14.28\",\"matchCriteriaId\":\"9160C0CD-1A4D-49F7-9261-EF8EA8F5B007\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.9.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C682EF47-BF0A-4B48-A1D1-A55A9ECA7F33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.9.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717F6453-69FA-426C-9346-CD7BEDE9C60B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.9.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3122762-BEF0-4988-BED9-4D8592C24CEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D9E2515-E79D-4237-97E9-D5BA35A5F4F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9562A87-9464-4203-8360-58E9A7E495FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4989628B-306C-4E03-A64E-718C4FF2778F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CB0B1D3-632D-442B-8B83-92591CD80A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DFADCC1-6162-482F-971A-04041715E562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52270405-2AC2-41B7-B07A-42763993D587\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4C5026-D1BD-490A-9C3B-526BDBD9F2BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F63A530D-1DB8-4AB4-A62D-BB73BDA6A96B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FE83D2A-D1F7-460F-AFFA-45D635D23B78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DA52B75-0BE4-4647-A02E-6C01FF15DD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7306A247-0AAE-43E7-A9E0-CE224A1B239B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8347AB5F-5194-4B96-A8E7-9EE51B82C8E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48A99CC-0F6E-49F4-99C5-8647A66A5B41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C844AC14-2ECA-45AB-B9A1-44CF626143BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466B21B4-DF59-4B55-8778-BD674A137F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C69AA54-AC53-4A10-8ED4-C426F4C37305\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC00A088-B0AC-4CCD-8EAE-31D4DB6372B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C34F7E-91AD-4009-A86B-E3C42533C67D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"840FA75D-5AFC-4011-AA2C-A851763A8E86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DDF073B-7437-4700-A5BD-B47CF1163302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D44007-FEEB-4A1E-BBEA-A8F9337ABE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"756ED650-7FBF-47D5-800D-B7CDCE98DB2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4047BBD-BC04-4CB1-A499-D2B8D3FE6B56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72E88290-55F4-4177-85F1-7ACBADEB6D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17561362-F579-4C4A-B706-E7BFD4B4D005\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C3A554-49D3-4AA0-AF85-A503288EDA7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DABD98F8-3512-4F83-BEA8-29787378990B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33AE89EC-30B6-4B2C-BB7D-105C7BA31673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"675635B9-B25D-4A6A-B990-F3347D76AF56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.10.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5591746-1BF7-41C2-8078-0CA13BA4FDE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9EDAF7A-A7EF-4FA2-AB0F-1B617311F6CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F6B0569-44FC-420E-BAF5-08149463D994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE641CD-FD8B-4B09-A738-46795F9CB9AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE98EF7-E1D0-460D-971D-F460494BB271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B55AEF9-3375-4E2D-9A5C-BC88626A4977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9734B69-76A9-43A9-96F5-7551DFE691E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38087DB8-ABB3-49F8-98B8-1C36BC588D59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48585882-3F63-4CBE-9C82-8E33F52F86C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA224D00-B0BE-4CCC-A221-9BE93AE5F453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87362BEE-E7B5-4390-9226-6C97F4C82E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"588BCD31-3824-40F9-8BE2-C63F6A40E970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"583BE1D2-6A50-4477-AD01-EA471B339F7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D64BC1C-4281-46E8-B6DD-20D09EB5DC59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8252FED-9D03-4224-ABB2-6E86E1278ECA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D013303-0BEA-44AE-A395-343EF27D207E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45FF0360-F1FE-4C59-829E-544D9CCE6673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18BE27E1-F670-41B8-A5C5-4C28C94D3826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BAEB637-6349-4452-B619-7080843E1A39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"698F4BA9-A8AD-4487-8989-5E41D80A162B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B458153-71BE-4EDF-950D-055D9A3D1E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A4DC29D-F36D-4B02-BDA8-F0316948BBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D46650E-EDE7-48B0-841D-CC0D45B92FD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D9D843A-4EA7-4B6D-BA62-A8C1C300F47A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5635A041-FBFB-411B-95F4-1A11248D4FE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090CD311-7B97-4E69-B2CA-6ED9FCBEDFDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C17AEE-408E-4D57-B5A8-027FEC9AD144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.13.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0431871F-39C5-4707-BE53-FAC9E9882170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"838E9A96-BA10-4A4A-AA41-EC025CCD07E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94EAFE0A-0A9D-4F9D-BB7F-F4C10797F463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AB4FDA2-5729-4964-B48F-01DBC26DAEA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D08D336-460B-4153-B747-B1F116065DE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D68401F3-1AF2-4FB5-916E-F40FB6E0DD1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56DC7349-C57C-47EB-BE92-3BE4719A32F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED090E5E-772F-44B5-86F6-D2388D431055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"526B3511-D083-4153-9DB8-6B8C62426876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB46B910-10AC-4B06-AC90-5E281AFF445E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC3A73DC-EE37-41DF-A939-4631A3D1F401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E37212-1BC4-44F5-AFEE-BF706FF9F771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"467A1EF6-2E3C-4786-82BD-687EB44B5541\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8096535-AF94-44E3-8266-006FDB84092B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0F65E09-7A40-45E2-BEB1-E11B694E7957\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50FFCFA9-67A9-4502-AD48-2A1CFB6D12D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C610809C-7C63-427B-9910-F6F0090B34A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA5A449F-B9B6-41DB-91B6-E75ABADFB835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6848180-B565-4DC0-87AB-84DF4BF51F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3070BF5-18C4-4ECD-8795-C569254F4E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"355873B5-FEB9-4FAB-BE8B-8D56C9990F0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0355952-8254-477D-BE82-37ED064F5A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0AA3EC2-4936-4F29-8885-377906DA346C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB4503AF-3941-4318-AAE9-38EF578361EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"958C20C5-3502-417B-8AF4-3E7E43919672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F9F52F6-DCF1-466E-8F28-77061513DEDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"126BF92A-9767-4A6C-985B-DB6C99E090B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69991FEF-82C9-4760-8623-B1A47348DD75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF95E1AA-1A05-4F97-8AAA-C815EE3994BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D6200AF-7734-422C-9059-652A4530EFE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5073553-FB4D-4BF1-B3BA-B5CC2B3F45E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26FA5D0-F06B-414F-9F65-D5821365DA18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A61614F0-B814-4367-A12B-22806A65E8A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0970B646-A060-452C-9473-28A87603DA9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:debian:dpkg:1.14.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093DF5AF-8AEA-48DF-B8AF-2357B7C5C4DA\"}]}]}],\"references\":[{\"url\":\"http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2011\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0582\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56887\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2011\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0582\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56887\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.