cabextract is vulnerable to directory traversal. Lack of proper checking for leading slashes when extracting files allows remote attackers to perform directory traversal attacks via a malformed UTF-8 characters that are changed to a UTF-8 encoded slash.
CPE | Name | Operator | Version |
---|---|---|---|
cabextract:stretch | eq | 1.6-1+b1 | |
cabextract:stretch | eq | 1.6-1+b1 |
lists.fedoraproject.org/pipermail/package-announce/2015-March/151145.html
lists.fedoraproject.org/pipermail/package-announce/2015-March/151147.html
www.cabextract.org.uk/
www.mandriva.com/security/advisories?name=MDVSA-2015:064
www.openwall.com/lists/oss-security/2015/02/18/3
www.openwall.com/lists/oss-security/2015/02/23/16
www.openwall.com/lists/oss-security/2015/02/23/24
security-tracker.debian.org/tracker/CVE-2015-2060