Debian Security Advisory
DSA-3676-1 unadf -- security update
- Date Reported:
- 24 Sep 2016
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 838248.
In Mitre's CVE dictionary: CVE-2016-1243, CVE-2016-1244.
- More information:
Tuomas Räsänen discovered two vulnerabilities in unADF, a tool to extract files from an Amiga Disk File dump (.adf):
A stack buffer overflow in the function extractTree() might allow an attacker, with control on the content of a ADF file, to execute arbitrary code with the privileges of the program execution.
The unADF extractor creates the path in the destination via a mkdir in a system() call. Since there was no sanitization on the input of the filenames, an attacker can directly inject code in the pathnames of archived directories in an ADF file.
For the oldstable distribution (wheezy), these problems have been fixed in version 0.7.11a-3+deb7u1.
For the stable distribution (jessie), these problems have been fixed in version 0.7.11a-3+deb8u1.
For the unstable distribution (sid), these problems have been fixed in version 0.7.11a-4.
We recommend that you upgrade your unadf packages.