Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2019-14751

Published: 20 August 2019

NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction.

From the Ubuntu Security Team

It was discovered that NLTK mishandled crafted ZIP archives during extraction. A remote attacker could use this vulnerability to write arbitrary files to the filesystem

Priority

Medium

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
nltk
Launchpad, Ubuntu, Debian
bionic
Released (3.2.5-1ubuntu0.1)
disco
Released (3.4-1ubuntu0.1)
trusty
Released (2.0~b9-0ubuntu4.1~esm2)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream
Released (3.4.5)
xenial
Released (3.1-1ubuntu0.1)
Patches:
upstream: https://github.com/nltk/nltk/commit/f59d7ed8df2e0e957f7f247fe218032abdbe9a10

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact High
Availability impact None
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N