CVE-2019-13241
Published: 4 July 2019
FlightCrew v0.9.2 and older are vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.
From the Ubuntu Security Team
Mike Salvatore discovered that FlightCrew mishandled certain malformed EPUB files. An attacker could use this vulnerability to write arbitrary files to the filesystem.
Priority
Status
Package | Release | Status |
---|---|---|
flightcrew Launchpad, Ubuntu, Debian |
bionic |
Released
(0.7.2+dfsg-10ubuntu0.1)
|
cosmic |
Released
(0.7.2+dfsg-12ubuntu0.1)
|
|
disco |
Released
(0.7.2+dfsg-13ubuntu0.19.04.1)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needed
|
|
xenial |
Released
(0.7.2+dfsg-6ubuntu0.1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |