Debian Security Advisory
DSA-652-1 unarj -- several vulnerabilities
- Date Reported:
- 21 Jan 2005
- Affected Packages:
- unarj
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 281922.
In Mitre's CVE dictionary: CVE-2004-0947, CVE-2004-1027. - More information:
-
Several vulnerabilities have been discovered in unarj, a non-free ARJ unarchive utility. The Common Vulnerabilities and Exposures Project identifies the following vulnerabilities:
- CAN-2004-0947
A buffer overflow has been discovered when handling long file names contained in an archive. An attacker could create a specially crafted archive which could cause unarj to crash or possibly execute arbitrary code when being extracted by a victim.
- CAN-2004-1027
A directory traversal vulnerability has been found so that an attacker could create a specially crafted archive which would create files in the parent directory when being extracted by a victim. When used recursively, this vulnerability could be used to overwrite critical system files and programs.
For the stable distribution (woody) these problems have been fixed in version 2.43-3woody1.
For the unstable distribution (sid) these problems don't apply since unstable/non-free does not contain the unarj package.
We recommend that you upgrade your unarj package.
- CAN-2004-0947
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1.dsc
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1.diff.gz
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43.orig.tar.gz
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_m68k.deb
- PowerPC:
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.