Vulnerability Details : CVE-2014-3697
Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.
Vulnerability category: Directory traversal
Exploit prediction scoring system (EPSS) score for CVE-2014-3697
Probability of exploitation activity in the next 30 days: 0.32%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 67 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3697
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:P |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2014-3697
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3697
-
http://pidgin.im/news/security/?id=89
Pidgin Security AdvisoriesPatch;Vendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html
openSUSE-SU-2014:1397-1: moderate: update for pidgin
-
http://hg.pidgin.im/pidgin/main/rev/68b8eb10977f
pidgin — BitbucketPatch
-
http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html
openSUSE-SU-2014:1376-1: moderate: update for pidgin
Products affected by CVE-2014-3697
- cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*