SB2015030101 - Fedora EPEL 7 update for cabextract
Published: March 1, 2015 Updated: April 24, 2025
Security Bulletin ID
SB2015030101
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Path traversal (CVE-ID: CVE-2015-2060)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
cabextract before 1.6 does not properly check for leading slashes when extracting files, which allows remote attackers to conduct absolute directory traversal attacks via a malformed UTF-8 character that is changed to a UTF-8 encoded slash.
Remediation
Install update from vendor's website.