CVE-2004-0916

Current Description

Directory traversal vulnerability in cabextract before 1.1 allows remote attackers to overwrite arbitrary files via a cabinet file containing .. (dot dot) sequences in a filename.

Basic Data

PublishedJanuary 27, 2005
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationCabextractCabextract0.2*******
    2.3ApplicationCabextractCabextract0.6*******
    2.3ApplicationCabextractCabextract1.0*******

Vulnerable Software List

VendorProductVersions
Cabextract Cabextract 0.2, 0.6, 1.0

References

NameSourceURLTags
12882http://secunia.com/advisories/12882/SECUNIAPatch Vendor Advisory
DSA-574http://www.debian.org/security/2004/dsa-574DEBIANPatch Vendor Advisory
http://www.kyz.uklinux.net/cabextract.php#changeshttp://www.kyz.uklinux.net/cabextract.php#changesCONFIRM
11460http://www.securityfocus.com/bid/11460BIDVendor Advisory
cabextract-directory-traversal(17766)https://exchange.xforce.ibmcloud.com/vulnerabilities/17766XF