Executive Summary

Summary
Title Updated unarj package fixes security issue
Informations
Name RHSA-2005:007 First vendor Publication 2005-01-12
Vendor RedHat Last vendor Modification 2005-01-12
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

An updated unarj package that fixes a buffer overflow vulnerability and a directory traversal vulnerability is now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

The unarj program is an archiving utility which can extract ARJ-compatible archives.

A buffer overflow bug was discovered in unarj when handling long file names contained in an archive. An attacker could create a specially crafted archive which could cause unarj to crash or possibly execute arbitrary code when extracted by a victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0947 to this issue.

Additionally, a path traversal vulnerability was discovered in unarj. An attacker could create a specially crafted archive which would create files in the parent ("..") directory when extracted by a victim. When used recursively, this vulnerability could be used to overwrite critical system files and programs. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1027 to this issue.

Users of unarj should upgrade to this updated package which contains backported patches and is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

138462 - CAN-2004-0947 buffer overflow in unarj 138835 - CAN-2004-1027 unarj directory traversal issue

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2005-007.html

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4
Application 4
Os 1
Os 1
Os 3

OpenVAS Exploits

Date Description
2009-10-10 Name : SLES9: Security update for unarj
File : nvt/sles9p5015411.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200411-29 (unarj)
File : nvt/glsa_200411_29.nasl
2008-09-04 Name : FreeBSD Ports: unarj
File : nvt/freebsd_unarj.nasl
2008-09-04 Name : FreeBSD Ports: unarj
File : nvt/freebsd_unarj0.nasl
2008-01-17 Name : Debian Security Advisory DSA 652-1 (unarj)
File : nvt/deb_652_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
11695 unarj Filename Handling Overflow

10788 unarj Traversal Arbitrary File Overwrite

The unarj utility has been reported to have a vulnerability related to traversal style attacks (/../) and uncompressing an archive. As reported, this would allow an attacker to overwrite any file the victim user has permission to write to. unarj (or tar or zip) allows full/absolute paths in archives and could be used in the same fashion, regardless of using traversal notation. This is a non-issue.

Nessus® Vulnerability Scanner

Date Description
2012-09-24 Name : The remote Fedora Core host is missing a security update.
File : fedora_2004-414.nasl - Type : ACT_GATHER_INFO
2009-09-24 Name : The remote SuSE 9 host is missing a security-related patch.
File : suse9_9523.nasl - Type : ACT_GATHER_INFO
2005-07-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_1f922de03fe511d9a9e70001020eed82.nasl - Type : ACT_GATHER_INFO
2005-07-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_a163baff3fe111d9a9e70001020eed82.nasl - Type : ACT_GATHER_INFO
2005-01-25 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-652.nasl - Type : ACT_GATHER_INFO
2005-01-13 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2005-007.nasl - Type : ACT_GATHER_INFO
2004-11-22 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200411-29.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:48:50
  • Multiple Updates