Vulnerability Details : CVE-2015-2304
Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
Vulnerability category: Directory traversal
Products affected by CVE-2015-2304
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:x64:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-2304
0.84%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-2304
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:P |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2015-2304
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-2304
-
http://www.debian.org/security/2015/dsa-3180
Debian -- Security Information -- DSA-3180-1 libarchive
-
http://www.openwall.com/lists/oss-security/2015/01/07/5
oss-security - Directory traversals in cpio and friends?Exploit
-
http://www.openwall.com/lists/oss-security/2015/01/16/7
oss-security - CVE Request: libarchive -- directory traversal in bsdcpio
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:157
mandriva.com
-
http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html
openSUSE-SU-2015:0568-1: moderate: Security update for libarchive
-
https://github.com/libarchive/libarchive/pull/110
Fix directory traversal in bsdcpio by ghedo · Pull Request #110 · libarchive/libarchive · GitHub
-
https://security.gentoo.org/glsa/201701-03
libarchive: Multiple vulnerabilities (GLSA 201701-03) — Gentoo security
-
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc
-
http://advisories.mageia.org/MGASA-2015-0106.html
Mageia Advisory: MGASA-2015-0106 - Updated libarchive packages fix security vulnerability
-
http://www.securitytracker.com/id/1035996
FreeBSD libarchive cpio(1) Directory Traversal Flaw Lets Remote Users Overwrite Files on the Target System - SecurityTracker
-
https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526
Add ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS option · libarchive/libarchive@5935715 · GitHub
-
https://groups.google.com/forum/#!msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J
Google Groepen
-
http://www.ubuntu.com/usn/USN-2549-1
USN-2549-1: libarchive vulnerabilities | Ubuntu security notices
Jump to