Unrated severityNVD Advisory· Published Oct 1, 2012· Updated Apr 29, 2026
CVE-2012-2241
CVE-2012-2241
Description
scripts/dget.pl in devscripts before 2.12.3 allows remote attackers to delete arbitrary files via a crafted (1) .dsc or (2) .changes file, probably related to a NULL byte in a filename.
Affected products
91cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*+ 90 more
- cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*range: <=2.12.2
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.11.6:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.11.7:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.11.8:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.11.9:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.8.14:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.9.21:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.9.22:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.9.23:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.9.24:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.9.25:*:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch1:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch2:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch4:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch5:*:*:*:*:*:*
- cpe:2.3:a:devscripts_devel_team:devscripts:2.9.27:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- secunia.com/advisories/50600nvdVendor Advisory
- www.debian.org/security/2012/dsa-2549nvdVendor Advisory
- www.securityfocus.com/bid/55564nvd
- www.ubuntu.com/usn/USN-1593-1nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/78977nvd
News mentions
0No linked articles in our index yet.