Directory traversal vulnerability in the read_long_names function in
libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers to
write to arbitrary files to the root directory via a / (slash) in a crafted
archive, as demonstrated using the ar program.
Author | Note |
---|---|
tyhicks | Directory traversal is restricted to the root directory |
secunia.com/advisories/61934
www.openwall.com/lists/oss-security/2014/12/29/2
git.fedorahosted.org/cgit/elfutils.git/commit/?id=147018e729e7c22eeabf15b82d26e4bf68a0d18e
launchpad.net/bugs/cve/CVE-2014-9447
lists.fedorahosted.org/pipermail/elfutils-devel/2014-December/004499.html
nvd.nist.gov/vuln/detail/CVE-2014-9447
security-tracker.debian.org/tracker/CVE-2014-9447
ubuntu.com/security/notices/USN-2482-1
www.cve.org/CVERecord?id=CVE-2014-9447