Bug 138836 - CAN-2004-1027 unarj directory traversal issue
Summary: CAN-2004-1027 unarj directory traversal issue
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: unarj
Version: 2
Hardware: All
OS: Linux
medium
low
Target Milestone: ---
Assignee: Lon Hohberger
QA Contact:
URL:
Whiteboard: impact=low,reported=20041109
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-11-11 14:55 UTC by Josh Bressers
Modified: 2007-11-30 22:10 UTC (History)
0 users

(edit)
Clone Of:
(edit)
Last Closed: 2004-11-11 19:20:22 UTC


Attachments (Terms of Use)
Demo exploit for this issue. (143 bytes, application/octet-stream)
2004-11-11 14:57 UTC, Josh Bressers
no flags Details

Description Josh Bressers 2004-11-11 14:55:33 UTC
This message was posted to full-disclosure

http://lists.netsys.com/pipermail/full-disclosure/2004-October/027348.html

after decoding it, it basically says there is a directory traversal
hole in unarj.

It is possible for an attacker to create a specially crafted arj
archive, which when a user extracts with the x flag, it is possible
for a file to be placed anywhere the user running arj has write
permissions.

Comment 1 Josh Bressers 2004-11-11 14:57:01 UTC
Created attachment 106504 [details]
Demo exploit for this issue.

You have to give unarj the 'x' option to see the result of this exploit.  It
will try to stick a file in /etc called foo.


Note You need to log in before you can comment on or make changes to this bug.