Lucene search

K
gentooGentoo FoundationGLSA-200502-32
HistoryFeb 28, 2005 - 12:00 a.m.

UnAce: Buffer overflow and directory traversal vulnerabilities

2005-02-2800:00:00
Gentoo Foundation
security.gentoo.org
17

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.004

Percentile

75.4%

Background

UnAce is an utility to extract, view and test the contents of an ACE archive.

Description

Ulf Harnhammar discovered that UnAce suffers from buffer overflows when testing, unpacking or listing specially crafted ACE archives (CAN-2005-0160). He also found out that UnAce is vulnerable to directory traversal attacks, if an archive contains “./…” sequences or absolute filenames (CAN-2005-0161).

Impact

An attacker could exploit the buffer overflows to execute malicious code or the directory traversals to overwrite arbitrary files.

Workaround

There is no known workaround at this time.

Resolution

All UnAce users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-arch/unace-2.5-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-arch/unace<= 2.5-r3UNKNOWN

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.004

Percentile

75.4%