|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA652] DSA-652-1 unarj Vulnerability Assessment Details
|
[DSA652] DSA-652-1 unarj |
||
DSA-652-1 unarj Detailed Explanation for this Vulnerability Assessment Several vulnerabilities have been discovered in unarj, a non-free ARJ unarchive utility. The Common Vulnerabilities and Exposures Project identifies the following vulnerabilities: A buffer overflow has been discovered when handling long file names contained in an archive. A possible hacker could create a specially crafted archive which could cause unarj to crash or possibly execute arbitrary code when being extracted by a victim. A directory traversal vulnerability has been found so that an attacker could create a specially crafted archive which would create files in the parent directory when being extracted by a victim. When used recursively, this vulnerability could be used to overwrite critical system files and programs. For the stable distribution (woody) these problems have been fixed in version 2.43-3woody1. For the unstable distribution (sid) these problems don't apply since unstable/non-free does not contain the unarj package. We recommend that you upgrade your unarj package. Solution : http://www.debian.org/security/2005/dsa-652 Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi |
||
Cables, Connectors |
Cisco UCS 5108 Blade Server Chassis Enclosure 8x B200 M4 16x E5-2640v3 128gb
$599.99
HP ProLiant BL460c G8(Gen8) 2x 8 CORE E5-2670 2.6GHz 192GB RAM 2x 146GB SAS HDD
$78.00
DELL M630 BLADE SERVER x2 XEON E5-2660V3 @ 2.6GH H730 PERC HDD CADDIES 16GB FC
$50.00
Dell PowerEdge FX2s CTO Blade 4 Slot 2U Chassis 2x 2000W
$349.00
DELL POWEREDGE M620 Blade 2x Xeon E5-2670 2.5GHz 128GB 2x300GB HDD
$94.50
Dell PowerEdge FC630 Xeon E5-2699 v4 256 GB DDR4 1U Server No Drives/No OS B9
$424.99
Dell PowerEdge M1000e (BMX01) Server Enclosure w/ 16-PowerEdge M610 Blade Server
$899.99
Dell PowerEdge M620 Blade Server
$39.99
UCSB-B200-M4 UCS Blade Server, 2x E5-2667 V3, 256GB RAM DDR4, 2x 300GB Drives
$299.99
Dell PowerEdge M630 Blade Server 2*Xeon E5-2630Lv3 8-Core 1.80GHz CPU 256GB RAM
$350.00
|
||
No Discussions have been posted on this vulnerability. |