Lucene search

K
redhatRedHatRHSA-2005:007
HistoryJan 12, 2005 - 12:00 a.m.

(RHSA-2005:007) unarj security update

2005-01-1200:00:00
access.redhat.com
9

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.1 Low

EPSS

Percentile

94.3%

The unarj program is an archiving utility which can extract ARJ-compatible
archives.

A buffer overflow bug was discovered in unarj when handling long file
names contained in an archive. An attacker could create a specially
crafted archive which could cause unarj to crash or possibly execute
arbitrary code when extracted by a victim. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0947 to
this issue.

Additionally, a path traversal vulnerability was discovered in unarj. An
attacker could create a specially crafted archive which would create files
in the parent (“…”) directory when extracted by a victim. When used
recursively, this vulnerability could be used to overwrite critical system
files and programs. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-1027 to this issue.

Users of unarj should upgrade to this updated package which contains
backported patches and is not vulnerable to these issues.

OSVersionArchitecturePackageVersionFilename
RedHatanyi386unarj< 2.43-13unarj-2.43-13.i386.rpm
RedHatanyia64unarj< 2.43-13unarj-2.43-13.ia64.rpm

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.1 Low

EPSS

Percentile

94.3%