External Control of File Name or Path Affecting elfutils-libelf package, versions <0:0.163-3.el7
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
0.95% (83rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-ELFUTILSLIBELF-2031773
- published 26 Jul 2021
- disclosed 27 Dec 2014
Introduced: 27 Dec 2014
CVE-2014-9447 Open this link in a new tabHow to fix?
Upgrade Centos:7
elfutils-libelf
to version 0:0.163-3.el7 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils-libelf
package and not the elfutils-libelf
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
Directory traversal vulnerability in the read_long_names function in libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers to write to arbitrary files to the root directory via a / (slash) in a crafted archive, as demonstrated using the ar program.
References
- http://www.securityfocus.com/bid/71804
- http://advisories.mageia.org/MGASA-2015-0033.html
- https://git.fedorahosted.org/cgit/elfutils.git/commit/?id=147018e729e7c22eeabf15b82d26e4bf68a0d18e
- https://access.redhat.com/security/cve/CVE-2014-9447
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148321.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148326.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:047
- https://lists.fedorahosted.org/pipermail/elfutils-devel/2014-December/004499.html
- http://www.openwall.com/lists/oss-security/2014/12/29/2
- https://access.redhat.com/errata/RHEA-2015:1302
- https://access.redhat.com/errata/RHEA-2015:2126
- http://secunia.com/advisories/61934
- http://secunia.com/advisories/62560
- http://secunia.com/advisories/62661