fkie_cve-2012-0210
Vulnerability from fkie_nvd
Published
2012-06-16 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
debdiff.pl in devscripts 2.10.x before 2.10.69 and 2.11.x before 2.11.4 allows remote attackers to obtain system information and execute arbitrary code via the file name in a (1) .dsc or (2) .changes file.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B37E638-D2DC-4187-BED3-147D07D1CFF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "478177D1-8E02-41C6-A11E-231B38F72500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "106FD07A-A79B-4B4F-B3AF-0307F4F73599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E625CC27-DB3E-43B9-BA5E-977AE6CDDFEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4745312C-C365-45B7-9DBD-0BCA19DC414C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D627634A-5227-4036-BA76-488215D481AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD3EE4B-3BBC-4F38-8642-0585977E02B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9F64E4B1-D4B0-4DEC-9153-6639C73E3ED1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*",
"matchCriteriaId": "46909A56-0F10-4064-9159-CD9171C3E391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1F6B7DF0-314D-4AFD-8586-8759D424EAE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2EE12BE7-59A4-4E11-B61B-4AFE4E37F915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*",
"matchCriteriaId": "8E68D785-CD78-444F-9189-E53B2B704FC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD05880-F918-4ACE-9A8B-9111B2C7E9DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*",
"matchCriteriaId": "CC63699C-44C2-4438-9680-F00DF07968EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*",
"matchCriteriaId": "099E73F3-44CC-486A-BD75-BEE21ABB7772",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*",
"matchCriteriaId": "5E35FD8D-861B-43F2-A0F5-9B0E3D8E1C98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2084CF59-B915-4A73-9C81-43DB90983BC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*",
"matchCriteriaId": "341105EB-E780-489D-AD7B-7D037CF48AA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*",
"matchCriteriaId": "9533D5FB-53EF-4761-8D47-C5F4FA100816",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*",
"matchCriteriaId": "E9067394-FA00-4C62-A1D8-B791309A525F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*",
"matchCriteriaId": "484F8413-C4B3-4E6D-AE03-FEB3D68478D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*",
"matchCriteriaId": "2F05DE13-E821-4DA2-9787-ADFDA1353660",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*",
"matchCriteriaId": "7742C715-0B2B-49BF-90D7-B4B5ABF2E159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*",
"matchCriteriaId": "508DD68D-9803-4D43-B84F-3DF992A1730F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*",
"matchCriteriaId": "37FB6D91-9FDE-4221-86C0-3F567534B210",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*",
"matchCriteriaId": "4803A5E0-9A78-47F2-88F4-99026DFAECC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*",
"matchCriteriaId": "5098A7EA-45F5-48CF-8C28-2E6DBB39353C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*",
"matchCriteriaId": "B88248B3-94FE-4089-AFDB-670198DC3D14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*",
"matchCriteriaId": "D23059A9-0B66-48F3-926A-F3C6EF8CF874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*",
"matchCriteriaId": "6E049F90-064A-40BC-8C32-0C0CB1653A47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6D9063-5269-4887-9242-A04A3D5400C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*",
"matchCriteriaId": "24DF21A7-41CC-41AA-B845-512030D8ADA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*",
"matchCriteriaId": "74F06A1D-A2DB-4CF7-A383-B3B4A552C657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*",
"matchCriteriaId": "2366772D-5E39-4F59-B2E6-D75E1108A7FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*",
"matchCriteriaId": "2D589348-6C86-4487-9895-6272864AAC9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*",
"matchCriteriaId": "B303BA74-3849-4A2F-9113-291FFDFCD109",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*",
"matchCriteriaId": "5CBB13F4-CEDE-4C6C-9371-25D798129707",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*",
"matchCriteriaId": "80D2AD6E-9579-4E11-B098-59CF004A9D84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*",
"matchCriteriaId": "702C25E2-FADF-4238-9A89-854A031F5C7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*",
"matchCriteriaId": "77CCBE14-BE1C-48E3-9FB7-B5F3530B62A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*",
"matchCriteriaId": "F2899892-1EEB-4C9E-AF10-F493653746DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*",
"matchCriteriaId": "36E86AF2-8140-46D5-B3FD-52EE1BE3C042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*",
"matchCriteriaId": "B44E8E97-DE1B-4A2D-BA09-2C4C220FAE85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*",
"matchCriteriaId": "539A35B0-EE2D-4049-AFC1-D5474DD3C6EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*",
"matchCriteriaId": "07F81B2A-62AA-4114-8496-C08B17407935",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*",
"matchCriteriaId": "55CE4566-800F-4ECC-BA6E-3EBBC3B5E3C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*",
"matchCriteriaId": "F47EF611-3277-4446-9291-7DF9C4AE361D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FCBFB21B-E6D2-4923-A25A-717FB935C7ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*",
"matchCriteriaId": "E89BEBB8-8A3C-4B5A-9DD4-956892F34C1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*",
"matchCriteriaId": "69EC8278-845F-4654-83A5-416C912CD41E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*",
"matchCriteriaId": "68C8BC4E-C3FA-4FD4-8291-C229EF36D38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*",
"matchCriteriaId": "4B19C6B3-7FF7-4264-9095-6A86A2637CCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*",
"matchCriteriaId": "C2FA99EC-4203-4192-9E44-A3A3E7FE0435",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*",
"matchCriteriaId": "88CE7625-887C-4AD6-B4BD-00AD6E32BE44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*",
"matchCriteriaId": "302C034D-A86A-4CD2-AF4F-27C443981B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*",
"matchCriteriaId": "31838EE3-794C-4DB4-839B-49FA58AE0026",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*",
"matchCriteriaId": "D939A773-850F-4377-A521-77BA08A033A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*",
"matchCriteriaId": "6383E967-0CB2-4432-8799-405813BA980F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*",
"matchCriteriaId": "BFECB8F8-DD51-4BE6-B595-A333132FDE54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*",
"matchCriteriaId": "B90D9ADC-1724-401E-9750-0E4CD4146B25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB7A241-1381-444D-8958-9ED6695CAA7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*",
"matchCriteriaId": "896579AF-B3E0-493A-A0B6-8B5EC0FB06AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5B6D14-10C4-4F4C-A016-BFF6F961C821",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*",
"matchCriteriaId": "4B336857-91E4-4393-93C1-EB385509F4BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*",
"matchCriteriaId": "0653E1CF-52A7-4879-93FA-A6D25004217E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8B375A-5E39-4A77-84E3-B57C42969AFE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7BF54C92-6BD6-419A-80B4-5CCD50144C4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96B915C5-BC84-4796-A342-71964617AA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BDCE154F-E1DC-4CA4-A002-664D497D0476",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8362FF7F-1BD5-4C5E-927C-8EE8F3A2FF41",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "debdiff.pl in devscripts 2.10.x before 2.10.69 and 2.11.x before 2.11.4 allows remote attackers to obtain system information and execute arbitrary code via the file name in a (1) .dsc or (2) .changes file."
},
{
"lang": "es",
"value": "debdiff.pl de devscripts 2.10.x anteriores a 2.10.69 y 2.11.x anteriores a 2.11.4 permite a atacantes remotos obtener informaci\u00f3n del sistema y ejecutar c\u00f3digo arbitrario a trav\u00e9s de un nombre de fichero en un archivo (1) .dsc o (2) .changes."
}
],
"id": "CVE-2012-0210",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-06-16T00:55:05.857",
"references": [
{
"source": "security@debian.org",
"url": "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git%3Ba=commitdiff%3Bh=797ddc961532eb0aeb46153e3f28c8e9ea0500d2"
},
{
"source": "security@debian.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47955"
},
{
"source": "security@debian.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/48039"
},
{
"source": "security@debian.org",
"tags": [
"Vendor Advisory"
],
"url": "http://ubuntu.com/usn/usn-1366-1"
},
{
"source": "security@debian.org",
"url": "http://www.debian.org/security/2012/dsa-2409"
},
{
"source": "security@debian.org",
"url": "http://www.osvdb.org/79319"
},
{
"source": "security@debian.org",
"url": "http://www.securityfocus.com/bid/52029"
},
{
"source": "security@debian.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73215"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git%3Ba=commitdiff%3Bh=797ddc961532eb0aeb46153e3f28c8e9ea0500d2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47955"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/48039"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://ubuntu.com/usn/usn-1366-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2012/dsa-2409"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/79319"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/52029"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73215"
}
],
"sourceIdentifier": "security@debian.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…