CVE Vulnerabilities

CVE-2011-0402

Improper Link Resolution Before File Access ('Link Following')

Published: Jan 11, 2011 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via a symlink attack on unspecified files in the .pc directory.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
DpkgDebian*1.14.30 (including)
DpkgDebian1.9.19 (including)1.9.19 (including)
DpkgDebian1.9.20 (including)1.9.20 (including)
DpkgDebian1.9.21 (including)1.9.21 (including)
DpkgDebian1.10 (including)1.10 (including)
DpkgDebian1.10.1 (including)1.10.1 (including)
DpkgDebian1.10.2 (including)1.10.2 (including)
DpkgDebian1.10.3 (including)1.10.3 (including)
DpkgDebian1.10.4 (including)1.10.4 (including)
DpkgDebian1.10.5 (including)1.10.5 (including)
DpkgDebian1.10.6 (including)1.10.6 (including)
DpkgDebian1.10.7 (including)1.10.7 (including)
DpkgDebian1.10.8 (including)1.10.8 (including)
DpkgDebian1.10.9 (including)1.10.9 (including)
DpkgDebian1.10.10 (including)1.10.10 (including)
DpkgDebian1.10.11 (including)1.10.11 (including)
DpkgDebian1.10.12 (including)1.10.12 (including)
DpkgDebian1.10.13 (including)1.10.13 (including)
DpkgDebian1.10.14 (including)1.10.14 (including)
DpkgDebian1.10.15 (including)1.10.15 (including)
DpkgDebian1.10.16 (including)1.10.16 (including)
DpkgDebian1.10.17 (including)1.10.17 (including)
DpkgDebian1.10.18 (including)1.10.18 (including)
DpkgDebian1.10.18.1 (including)1.10.18.1 (including)
DpkgDebian1.10.19 (including)1.10.19 (including)
DpkgDebian1.10.20 (including)1.10.20 (including)
DpkgDebian1.10.21 (including)1.10.21 (including)
DpkgDebian1.10.22 (including)1.10.22 (including)
DpkgDebian1.10.23 (including)1.10.23 (including)
DpkgDebian1.10.24 (including)1.10.24 (including)
DpkgDebian1.10.25 (including)1.10.25 (including)
DpkgDebian1.10.26 (including)1.10.26 (including)
DpkgDebian1.10.27 (including)1.10.27 (including)
DpkgDebian1.10.28 (including)1.10.28 (including)
DpkgDebian1.13.0 (including)1.13.0 (including)
DpkgDebian1.13.1 (including)1.13.1 (including)
DpkgDebian1.13.2 (including)1.13.2 (including)
DpkgDebian1.13.3 (including)1.13.3 (including)
DpkgDebian1.13.4 (including)1.13.4 (including)
DpkgDebian1.13.5 (including)1.13.5 (including)
DpkgDebian1.13.6 (including)1.13.6 (including)
DpkgDebian1.13.7 (including)1.13.7 (including)
DpkgDebian1.13.8 (including)1.13.8 (including)
DpkgDebian1.13.9 (including)1.13.9 (including)
DpkgDebian1.13.10 (including)1.13.10 (including)
DpkgDebian1.13.11 (including)1.13.11 (including)
DpkgDebian1.13.11.1 (including)1.13.11.1 (including)
DpkgDebian1.13.12 (including)1.13.12 (including)
DpkgDebian1.13.13 (including)1.13.13 (including)
DpkgDebian1.13.14 (including)1.13.14 (including)
DpkgDebian1.13.15 (including)1.13.15 (including)
DpkgDebian1.13.16 (including)1.13.16 (including)
DpkgDebian1.13.17 (including)1.13.17 (including)
DpkgDebian1.13.18 (including)1.13.18 (including)
DpkgDebian1.13.19 (including)1.13.19 (including)
DpkgDebian1.13.20 (including)1.13.20 (including)
DpkgDebian1.13.21 (including)1.13.21 (including)
DpkgDebian1.13.22 (including)1.13.22 (including)
DpkgDebian1.13.23 (including)1.13.23 (including)
DpkgDebian1.13.24 (including)1.13.24 (including)
DpkgDebian1.13.25 (including)1.13.25 (including)
DpkgDebian1.14.0 (including)1.14.0 (including)
DpkgDebian1.14.1 (including)1.14.1 (including)
DpkgDebian1.14.2 (including)1.14.2 (including)
DpkgDebian1.14.3 (including)1.14.3 (including)
DpkgDebian1.14.4 (including)1.14.4 (including)
DpkgDebian1.14.5 (including)1.14.5 (including)
DpkgDebian1.14.6 (including)1.14.6 (including)
DpkgDebian1.14.7 (including)1.14.7 (including)
DpkgDebian1.14.8 (including)1.14.8 (including)
DpkgDebian1.14.9 (including)1.14.9 (including)
DpkgDebian1.14.10 (including)1.14.10 (including)
DpkgDebian1.14.11 (including)1.14.11 (including)
DpkgDebian1.14.12 (including)1.14.12 (including)
DpkgDebian1.14.13 (including)1.14.13 (including)
DpkgDebian1.14.14 (including)1.14.14 (including)
DpkgDebian1.14.15 (including)1.14.15 (including)
DpkgDebian1.14.16 (including)1.14.16 (including)
DpkgDebian1.14.16.1 (including)1.14.16.1 (including)
DpkgDebian1.14.16.2 (including)1.14.16.2 (including)
DpkgDebian1.14.16.3 (including)1.14.16.3 (including)
DpkgDebian1.14.16.4 (including)1.14.16.4 (including)
DpkgDebian1.14.16.5 (including)1.14.16.5 (including)
DpkgDebian1.14.16.6 (including)1.14.16.6 (including)
DpkgDebian1.14.17 (including)1.14.17 (including)
DpkgDebian1.14.18 (including)1.14.18 (including)
DpkgDebian1.14.19 (including)1.14.19 (including)
DpkgDebian1.14.20 (including)1.14.20 (including)
DpkgDebian1.14.21 (including)1.14.21 (including)
DpkgDebian1.14.22 (including)1.14.22 (including)
DpkgDebian1.14.23 (including)1.14.23 (including)
DpkgDebian1.14.24 (including)1.14.24 (including)
DpkgDebian1.14.25 (including)1.14.25 (including)
DpkgDebian1.14.26 (including)1.14.26 (including)
DpkgDebian1.14.27 (including)1.14.27 (including)
DpkgDebian1.14.28 (including)1.14.28 (including)
DpkgDebian1.14.29 (including)1.14.29 (including)
DpkgUbuntudevel*
DpkgUbuntukarmic*
DpkgUbuntulucid*
DpkgUbuntumaverick*
DpkgUbuntuupstream*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References