Executive Summary

Informations
Name CVE-2004-1027 First vendor Publication 2005-03-01
Vendor Cve Last vendor Modification 2024-11-20

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote attackers to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequences.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1027

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4
Os 1
Os 1

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200411-29 (unarj)
File : nvt/glsa_200411_29.nasl
2008-09-04 Name : FreeBSD Ports: unarj
File : nvt/freebsd_unarj0.nasl
2008-01-17 Name : Debian Security Advisory DSA 628-1 (imlib2)
File : nvt/deb_628_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 652-1 (unarj)
File : nvt/deb_652_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
10788 unarj Traversal Arbitrary File Overwrite

The unarj utility has been reported to have a vulnerability related to traversal style attacks (/../) and uncompressing an archive. As reported, this would allow an attacker to overwrite any file the victim user has permission to write to. unarj (or tar or zip) allows full/absolute paths in archives and could be used in the same fashion, regardless of using traversal notation. This is a non-issue.

Nessus® Vulnerability Scanner

Date Description
2005-07-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_1f922de03fe511d9a9e70001020eed82.nasl - Type : ACT_GATHER_INFO
2005-01-25 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-652.nasl - Type : ACT_GATHER_INFO
2005-01-13 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2005-007.nasl - Type : ACT_GATHER_INFO
2005-01-06 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-628.nasl - Type : ACT_GATHER_INFO
2004-11-22 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200411-29.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027348.html
http://lwn.net/Articles/121827/
http://security.gentoo.org/glsa/glsa-200411-29.xml
http://www.debian.org/security/2005/dsa-628
http://www.debian.org/security/2005/dsa-652
http://www.redhat.com/support/errata/RHSA-2005-007.html
http://www.securityfocus.com/bid/11436
https://exchange.xforce.ibmcloud.com/vulnerabilities/17684
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2024-11-28 23:22:31
  • Multiple Updates
2024-11-28 12:06:16
  • Multiple Updates
2023-10-30 21:29:01
  • Multiple Updates
2021-05-04 12:02:26
  • Multiple Updates
2021-04-22 01:02:36
  • Multiple Updates
2020-05-23 00:15:56
  • Multiple Updates
2017-07-11 12:01:33
  • Multiple Updates
2014-02-17 10:28:19
  • Multiple Updates
2013-05-11 11:43:41
  • Multiple Updates