Debian Security Advisory

DSA-652-1 unarj -- several vulnerabilities

Date Reported:
21 Jan 2005
Affected Packages:
unarj
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 281922.
In Mitre's CVE dictionary: CVE-2004-0947, CVE-2004-1027.
More information:

Several vulnerabilities have been discovered in unarj, a non-free ARJ unarchive utility. The Common Vulnerabilities and Exposures Project identifies the following vulnerabilities:

  • CAN-2004-0947

    A buffer overflow has been discovered when handling long file names contained in an archive. An attacker could create a specially crafted archive which could cause unarj to crash or possibly execute arbitrary code when being extracted by a victim.

  • CAN-2004-1027

    A directory traversal vulnerability has been found so that an attacker could create a specially crafted archive which would create files in the parent directory when being extracted by a victim. When used recursively, this vulnerability could be used to overwrite critical system files and programs.

For the stable distribution (woody) these problems have been fixed in version 2.43-3woody1.

For the unstable distribution (sid) these problems don't apply since unstable/non-free does not contain the unarj package.

We recommend that you upgrade your unarj package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1.dsc
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1.diff.gz
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_alpha.deb
ARM:
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_ia64.deb
HPPA:
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_m68k.deb
PowerPC:
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/non-free/u/unarj/unarj_2.43-3woody1_sparc.deb

MD5 checksums of the listed files are available in the original advisory.