|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200411-29] unarj: Long filenames buffer overflow and a path traversal vulnerability Vulnerability Assessment Details
|
[GLSA-200411-29] unarj: Long filenames buffer overflow and a path traversal vulnerability |
||
unarj: Long filenames buffer overflow and a path traversal vulnerability Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200411-29 (unarj: Long filenames buffer overflow and a path traversal vulnerability) unarj has a bounds checking vulnerability within the handling of long filenames in archives. It also fails to properly sanitize paths when extracting an archive (if the "x" option is used to preserve paths). Impact A possible hacker could trigger a buffer overflow or a path traversal by enticing a user to open an archive containing specially-crafted path names, potentially resulting in the overwrite of files or execution of arbitrary code with the permissions of the user running unarj. Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0947 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1027 Solution: All unarj users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-arch/unarj-2.63a-r2" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
WD 2TB Certified Refurbished Elements, External Hard Drive - RWDBU6Y0020BBK-WESN
$49.99
Seagate Barracuda ST10000DM005 10TB 256MB SATA 6Gb/s 3.5" Internal Hard Drive
$153.99
$59.99
80GB Hard Drive IBM Thinkpad R32 R40 R50 R51 R52 T30 T40 T41 T42 T43 IDE Laptop
$19.10
HGST Ultrastar DC HC520 12TB SATA 6Gb 256MB 3.5" Enterprise HDD- HUH721212ALE601
$79.99
Seagate ST12000NM0127 12TB 256MB 7200RPM 3.5" SATA 6.0Gb/s Enterprise Hard Drive
$93.88
Seagate ST12000NM0127 12TB SATA 6Gb/s 256MB 7200RPM 3.5" Enterprise Hard Drive
$99.99
Seagate Exos 7E10 ST2000NM000B 2TB 7200RPM SATA 6.0Gb/s 3.5" Internal Hard Drive
$29.99
8TB Seagate Archive SATA 3.5" HDD Hard Drive 100% Healthy 200MB/s ST8000AS0002
$36.79
HGST 0F27352 10TB 3.5" SAS 7200 RPM 12Gb/s Hard Drive 100% #73 v
$65.00
|
||
No Discussions have been posted on this vulnerability. |