Bug 138836 - CAN-2004-1027 unarj directory traversal issue
CAN-2004-1027 unarj directory traversal issue
Status: CLOSED ERRATA
Product: Fedora
Classification: Fedora
Component: unarj (Show other bugs)
2
All Linux
medium Severity low
: ---
: ---
Assigned To: Lon Hohberger
impact=low,reported=20041109
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2004-11-11 09:55 EST by Josh Bressers
Modified: 2007-11-30 17:10 EST (History)
0 users

See Also:
Fixed In Version: 2.63a-7
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2004-11-11 14:20:22 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Demo exploit for this issue. (143 bytes, application/octet-stream)
2004-11-11 09:57 EST, Josh Bressers
no flags Details

  None (edit)
Description Josh Bressers 2004-11-11 09:55:33 EST
This message was posted to full-disclosure

http://lists.netsys.com/pipermail/full-disclosure/2004-October/027348.html

after decoding it, it basically says there is a directory traversal
hole in unarj.

It is possible for an attacker to create a specially crafted arj
archive, which when a user extracts with the x flag, it is possible
for a file to be placed anywhere the user running arj has write
permissions.
Comment 1 Josh Bressers 2004-11-11 09:57:01 EST
Created attachment 106504 [details]
Demo exploit for this issue.

You have to give unarj the 'x' option to see the result of this exploit.  It
will try to stick a file in /etc called foo.

Note You need to log in before you can comment on or make changes to this bug.