fkie_cve-2012-2241
Vulnerability from fkie_nvd
Published
2012-10-01 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
scripts/dget.pl in devscripts before 2.12.3 allows remote attackers to delete arbitrary files via a crafted (1) .dsc or (2) .changes file, probably related to a NULL byte in a filename.
Impacted products
Vendor Product Version
devscripts_devel_team devscripts *
devscripts_devel_team devscripts 2.7.0
devscripts_devel_team devscripts 2.8.14
devscripts_devel_team devscripts 2.9.21
devscripts_devel_team devscripts 2.9.22
devscripts_devel_team devscripts 2.9.23
devscripts_devel_team devscripts 2.9.24
devscripts_devel_team devscripts 2.9.25
devscripts_devel_team devscripts 2.9.26
devscripts_devel_team devscripts 2.9.26
devscripts_devel_team devscripts 2.9.26
devscripts_devel_team devscripts 2.9.26
devscripts_devel_team devscripts 2.9.27
devscripts_devel_team devscripts 2.10.0
devscripts_devel_team devscripts 2.10.1
devscripts_devel_team devscripts 2.10.3
devscripts_devel_team devscripts 2.10.6
devscripts_devel_team devscripts 2.10.7
devscripts_devel_team devscripts 2.10.8
devscripts_devel_team devscripts 2.10.9
devscripts_devel_team devscripts 2.10.10
devscripts_devel_team devscripts 2.10.11
devscripts_devel_team devscripts 2.10.12
devscripts_devel_team devscripts 2.10.13
devscripts_devel_team devscripts 2.10.14
devscripts_devel_team devscripts 2.10.15
devscripts_devel_team devscripts 2.10.16
devscripts_devel_team devscripts 2.10.17
devscripts_devel_team devscripts 2.10.18
devscripts_devel_team devscripts 2.10.18.1
devscripts_devel_team devscripts 2.10.19
devscripts_devel_team devscripts 2.10.20
devscripts_devel_team devscripts 2.10.21
devscripts_devel_team devscripts 2.10.22
devscripts_devel_team devscripts 2.10.23
devscripts_devel_team devscripts 2.10.24
devscripts_devel_team devscripts 2.10.25
devscripts_devel_team devscripts 2.10.26
devscripts_devel_team devscripts 2.10.27
devscripts_devel_team devscripts 2.10.28
devscripts_devel_team devscripts 2.10.29
devscripts_devel_team devscripts 2.10.30
devscripts_devel_team devscripts 2.10.31
devscripts_devel_team devscripts 2.10.32
devscripts_devel_team devscripts 2.10.33
devscripts_devel_team devscripts 2.10.34
devscripts_devel_team devscripts 2.10.35
devscripts_devel_team devscripts 2.10.36
devscripts_devel_team devscripts 2.10.38
devscripts_devel_team devscripts 2.10.39
devscripts_devel_team devscripts 2.10.40
devscripts_devel_team devscripts 2.10.41
devscripts_devel_team devscripts 2.10.42
devscripts_devel_team devscripts 2.10.43
devscripts_devel_team devscripts 2.10.44
devscripts_devel_team devscripts 2.10.45
devscripts_devel_team devscripts 2.10.46
devscripts_devel_team devscripts 2.10.47
devscripts_devel_team devscripts 2.10.48
devscripts_devel_team devscripts 2.10.49
devscripts_devel_team devscripts 2.10.50
devscripts_devel_team devscripts 2.10.51
devscripts_devel_team devscripts 2.10.52
devscripts_devel_team devscripts 2.10.53
devscripts_devel_team devscripts 2.10.54
devscripts_devel_team devscripts 2.10.55
devscripts_devel_team devscripts 2.10.56
devscripts_devel_team devscripts 2.10.57
devscripts_devel_team devscripts 2.10.58
devscripts_devel_team devscripts 2.10.59
devscripts_devel_team devscripts 2.10.60
devscripts_devel_team devscripts 2.10.61
devscripts_devel_team devscripts 2.10.62
devscripts_devel_team devscripts 2.10.63
devscripts_devel_team devscripts 2.10.64
devscripts_devel_team devscripts 2.10.65.1
devscripts_devel_team devscripts 2.10.66
devscripts_devel_team devscripts 2.10.67
devscripts_devel_team devscripts 2.10.68
devscripts_devel_team devscripts 2.11.0
devscripts_devel_team devscripts 2.11.1
devscripts_devel_team devscripts 2.11.2
devscripts_devel_team devscripts 2.11.3
devscripts_devel_team devscripts 2.11.4
devscripts_devel_team devscripts 2.11.5
devscripts_devel_team devscripts 2.11.6
devscripts_devel_team devscripts 2.11.7
devscripts_devel_team devscripts 2.11.8
devscripts_devel_team devscripts 2.11.9
devscripts_devel_team devscripts 2.12.0
devscripts_devel_team devscripts 2.12.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5653FD6B-C7BB-4281-8640-E553171982AD",
              "versionEndIncluding": "2.12.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA4B6F73-B44C-4A69-BE2B-16217F3C63B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.8.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "44930ABC-D54B-4100-81E3-3A410115E77D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE8DB5CB-4BA9-4C28-A056-B37C78AFE2F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "899143AD-EFA4-4976-BC24-7B64D0F749BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE50027D-8053-4094-9554-D921953F2198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B34B404E-C2DB-41F0-A165-57885A46CE8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7733986E-303D-4177-9870-63F5E27FE0D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch1:*:*:*:*:*:*",
              "matchCriteriaId": "C437A5EA-17E4-4FF5-90CD-A056915C2EFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch2:*:*:*:*:*:*",
              "matchCriteriaId": "7FCB809F-2280-4991-89A7-0C124AFAB3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch4:*:*:*:*:*:*",
              "matchCriteriaId": "51E396C2-050B-4C66-ADB8-268959A2AD8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch5:*:*:*:*:*:*",
              "matchCriteriaId": "B7E8316B-C0F5-4F10-B5B5-DCD89D5EF2A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7470A66-B3FF-43AE-851B-3B5D076FBFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B37E638-D2DC-4187-BED3-147D07D1CFF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "478177D1-8E02-41C6-A11E-231B38F72500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "106FD07A-A79B-4B4F-B3AF-0307F4F73599",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E625CC27-DB3E-43B9-BA5E-977AE6CDDFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4745312C-C365-45B7-9DBD-0BCA19DC414C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D627634A-5227-4036-BA76-488215D481AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD3EE4B-3BBC-4F38-8642-0585977E02B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F64E4B1-D4B0-4DEC-9153-6639C73E3ED1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "46909A56-0F10-4064-9159-CD9171C3E391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6B7DF0-314D-4AFD-8586-8759D424EAE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EE12BE7-59A4-4E11-B61B-4AFE4E37F915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E68D785-CD78-444F-9189-E53B2B704FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD05880-F918-4ACE-9A8B-9111B2C7E9DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC63699C-44C2-4438-9680-F00DF07968EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "099E73F3-44CC-486A-BD75-BEE21ABB7772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E35FD8D-861B-43F2-A0F5-9B0E3D8E1C98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2084CF59-B915-4A73-9C81-43DB90983BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "341105EB-E780-489D-AD7B-7D037CF48AA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9533D5FB-53EF-4761-8D47-C5F4FA100816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9067394-FA00-4C62-A1D8-B791309A525F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "484F8413-C4B3-4E6D-AE03-FEB3D68478D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F05DE13-E821-4DA2-9787-ADFDA1353660",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "7742C715-0B2B-49BF-90D7-B4B5ABF2E159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "508DD68D-9803-4D43-B84F-3DF992A1730F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FB6D91-9FDE-4221-86C0-3F567534B210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4803A5E0-9A78-47F2-88F4-99026DFAECC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "5098A7EA-45F5-48CF-8C28-2E6DBB39353C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88248B3-94FE-4089-AFDB-670198DC3D14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23059A9-0B66-48F3-926A-F3C6EF8CF874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E049F90-064A-40BC-8C32-0C0CB1653A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC6D9063-5269-4887-9242-A04A3D5400C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DF21A7-41CC-41AA-B845-512030D8ADA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "74F06A1D-A2DB-4CF7-A383-B3B4A552C657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "2366772D-5E39-4F59-B2E6-D75E1108A7FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D589348-6C86-4487-9895-6272864AAC9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B303BA74-3849-4A2F-9113-291FFDFCD109",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CBB13F4-CEDE-4C6C-9371-25D798129707",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "80D2AD6E-9579-4E11-B098-59CF004A9D84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "702C25E2-FADF-4238-9A89-854A031F5C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "77CCBE14-BE1C-48E3-9FB7-B5F3530B62A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2899892-1EEB-4C9E-AF10-F493653746DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "36E86AF2-8140-46D5-B3FD-52EE1BE3C042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44E8E97-DE1B-4A2D-BA09-2C4C220FAE85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "539A35B0-EE2D-4049-AFC1-D5474DD3C6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "07F81B2A-62AA-4114-8496-C08B17407935",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "55CE4566-800F-4ECC-BA6E-3EBBC3B5E3C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47EF611-3277-4446-9291-7DF9C4AE361D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCBFB21B-E6D2-4923-A25A-717FB935C7ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "E89BEBB8-8A3C-4B5A-9DD4-956892F34C1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "69EC8278-845F-4654-83A5-416C912CD41E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "68C8BC4E-C3FA-4FD4-8291-C229EF36D38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B19C6B3-7FF7-4264-9095-6A86A2637CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2FA99EC-4203-4192-9E44-A3A3E7FE0435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "88CE7625-887C-4AD6-B4BD-00AD6E32BE44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "302C034D-A86A-4CD2-AF4F-27C443981B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "31838EE3-794C-4DB4-839B-49FA58AE0026",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "D939A773-850F-4377-A521-77BA08A033A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "6383E967-0CB2-4432-8799-405813BA980F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFECB8F8-DD51-4BE6-B595-A333132FDE54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "B90D9ADC-1724-401E-9750-0E4CD4146B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB7A241-1381-444D-8958-9ED6695CAA7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "896579AF-B3E0-493A-A0B6-8B5EC0FB06AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE5B6D14-10C4-4F4C-A016-BFF6F961C821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B336857-91E4-4393-93C1-EB385509F4BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "0653E1CF-52A7-4879-93FA-A6D25004217E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D8B375A-5E39-4A77-84E3-B57C42969AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BF54C92-6BD6-419A-80B4-5CCD50144C4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96B915C5-BC84-4796-A342-71964617AA43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCE154F-E1DC-4CA4-A002-664D497D0476",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8362FF7F-1BD5-4C5E-927C-8EE8F3A2FF41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8446F7B-950C-4BBA-9EEB-272F2871B914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE882BB4-0FE2-465C-82CE-1399D16E85C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E8D59AC-F408-4F5E-894A-C90358ADEA35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D787A0-AAB6-4124-AABE-F2289518E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9E3B2B3-4BA7-4A00-9752-D92B17390A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E0D8651-0119-4F57-9118-AF34E02FB08B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF1044AF-D62E-4A7D-862D-C9E11F97809F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB55181-27B0-49C7-AA2F-17EF7FBED277",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "scripts/dget.pl in devscripts before 2.12.3 allows remote attackers to delete arbitrary files via a crafted (1) .dsc or (2) .changes file, probably related to a NULL byte in a filename."
    },
    {
      "lang": "es",
      "value": "scripts/dget.pl en devscripts anterior a v2.12.3  permite a atacantes remotos borrar ficheros arbitrarios mediante un fichero (1) .dsc o (2) .changes manipulado, probablemente relacionado con un byte NULL en un nombre de fichero."
    }
  ],
  "id": "CVE-2012-2241",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-10-01T00:55:01.273",
  "references": [
    {
      "source": "security@debian.org",
      "url": "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git%3Ba=commitdiff%3Bh=0fd15bdec07b085f9ef438dacd18e159ac60b810"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/50600"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2012/dsa-2549"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/bid/55564"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.ubuntu.com/usn/USN-1593-1"
    },
    {
      "source": "security@debian.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git%3Ba=commitdiff%3Bh=0fd15bdec07b085f9ef438dacd18e159ac60b810"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/50600"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2012/dsa-2549"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55564"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1593-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78977"
    }
  ],
  "sourceIdentifier": "security@debian.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…