{"id":"UBUNTU-CVE-2014-8737","details":"Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full path name in an archive to (1) strip or (2) objcopy or create arbitrary files via (3) a .. (dot dot) or full path name in an archive to ar.","modified":"2026-02-04T04:16:18.597125Z","published":"2014-12-09T00:00:00Z","related":["USN-2496-1"],"upstream":["CVE-2014-8737"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-8737"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2496-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-8737"}],"affected":[{"package":{"name":"binutils","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/binutils@2.24-5ubuntu3.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.24-5ubuntu3.1"}]}],"versions":["2.23.52.20130913-0ubuntu1","2.23.90.20131017-1ubuntu1","2.23.90.20131116-1ubuntu1","2.23.91.20131123-1ubuntu1","2.24-1ubuntu1","2.24-1ubuntu2","2.24-2ubuntu1","2.24-2ubuntu2","2.24-2ubuntu3","2.24-4ubuntu1","2.24-5ubuntu1","2.24-5ubuntu2","2.24-5ubuntu3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2.24-5ubuntu3.1","binary_name":"binutils"},{"binary_version":"2.24-5ubuntu3.1","binary_name":"binutils-dev"},{"binary_version":"2.24-5ubuntu3.1","binary_name":"binutils-multiarch"},{"binary_version":"2.24-5ubuntu3.1","binary_name":"binutils-multiarch-dev"},{"binary_version":"2.24-5ubuntu3.1","binary_name":"binutils-source"},{"binary_version":"2.24-5ubuntu3.1","binary_name":"binutils-static"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-8737.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}