Lucene search

K
osvGoogleOSV:DLA-188-1
HistoryApr 08, 2015 - 12:00 a.m.

arj - security update

2015-04-0800:00:00
Google
osv.dev
5

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.025 Low

EPSS

Percentile

88.5%

Multiple vulnerabilities have been discovered in arj, an open source
version of the arj archiver. The Common Vulnerabilities and Exposures
project identifies the following problems:

  • CVE-2015-0556
    Jakub Wilk discovered that arj follows symlinks created during
    unpacking of an arj archive. A remote attacker could use this flaw
    to perform a directory traversal attack if a user or automated
    system were tricked into processing a specially crafted arj archive.
  • CVE-2015-0557
    Jakub Wilk discovered that arj does not sufficiently protect from
    directory traversal while unpacking an arj archive containing file
    paths with multiple leading slashes. A remote attacker could use
    this flaw to write to arbitrary files if a user or automated system
    were tricked into processing a specially crafted arj archive.
  • CVE-2015-2782
    Jakub Wilk and Guillem Jover discovered a buffer overflow
    vulnerability in arj. A remote attacker could use this flaw to cause
    an application crash or, possibly, execute arbitrary code with the
    privileges of the user running arj.
CPENameOperatorVersion
arjeq3.10.22-9

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.025 Low

EPSS

Percentile

88.5%