UBUNTU-CVE-2015-2060

Source
https://ubuntu.com/security/CVE-2015-2060
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-2060.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2015-2060
Upstream
Published
2019-11-29T21:15:00Z
Modified
2025-09-08T16:43:20Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

cabextract before 1.6 does not properly check for leading slashes when extracting files, which allows remote attackers to conduct absolute directory traversal attacks via a malformed UTF-8 character that is changed to a UTF-8 encoded slash.

References

Affected packages

Ubuntu:Pro:14.04:LTS / cabextract

Package

Name
cabextract
Purl
pkg:deb/ubuntu/cabextract@1.4-4ubuntu0.1~esm1?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4-4ubuntu0.1~esm1

Affected versions

1.*
1.4-4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4-4ubuntu0.1~esm1",
            "binary_name": "cabextract"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-2060.json"