Lucene search

K
gentooGentoo FoundationGLSA-201209-21
HistorySep 28, 2012 - 12:00 a.m.

fastjar: Directory traversal

2012-09-2800:00:00
Gentoo Foundation
security.gentoo.org
8

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.013 Low

EPSS

Percentile

86.0%

Background

fastjar is a Java archiver written in C.

Description

Two directory traversal vulnerabilities have been discovered in fastjar. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could entice a user to open a specially crafted JAR file, possibly resulting in the creation or truncation of arbitrary files.

Workaround

There is no known workaround at this time.

Resolution

All fastjar users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-arch/fastjar-0.98-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-arch/fastjar< 0.98-r1UNKNOWN

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.013 Low

EPSS

Percentile

86.0%