Lucene search

K
gentooGentoo FoundationGLSA-200611-24
HistoryNov 28, 2006 - 12:00 a.m.

LHa: Multiple vulnerabilities

2006-11-2800:00:00
Gentoo Foundation
security.gentoo.org
11

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.065 Low

EPSS

Percentile

93.7%

Background

LHa is a console-based program for packing and unpacking LHarc archives.

Description

Tavis Ormandy of the Google Security Team discovered several vulnerabilities in the LZH decompression component used by LHa. The make_table function of unlzh.c contains an array index error and a buffer overflow vulnerability. The build_tree function of unpack.c contains a buffer underflow vulnerability. Additionally, unlzh.c contains a code that could run in an infinite loop.

Impact

By enticing a user to uncompress a specially crafted archive, a remote attacker could cause a Denial of Service by CPU consumption or execute arbitrary code with the rights of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All LHa users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-arch/lha-114i-r6"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-arch/lha< 114i-r6UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.065 Low

EPSS

Percentile

93.7%