Bug 981471 (CVE-2013-4668) - CVE-2013-4668 file-roller: path sanitization errors
Summary: CVE-2013-4668 file-roller: path sanitization errors
Alias: CVE-2013-4668
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 981507 982134
Blocks: 981473
TreeView+ depends on / blocked
Reported: 2013-07-04 20:48 UTC by Kurt Seifried
Modified: 2021-02-17 07:32 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2013-07-08 08:50:19 UTC

Attachments (Terms of Use)

Description Kurt Seifried 2013-07-04 20:48:33 UTC
Andrea Barisani (lcars) reports:

#2013-001 File Roller path sanitization errors


The File Roller archive manager for the GNOME desktop suffers from a path traversal vulnerability caused by insufficient path sanitization.

A specially crafted archive file can be used to trigger creation of arbitrary files in any location, writable by the user executing the extraction, outside the current working directory. This behaviour is triggered when the option 'Keep directory structure' is selected from the application 'Extract' dialog.

The issue is present on File Roller installations which have been compiled with libarchive support, used to handle tar, cpio, lha, 7zip, ar archiving formats and ISO images. The libarchive support is enabled by default.

Affected version:

File Roller >= 3.6.0, >= 3.8.0, >= 3.9.1

Fixed version:

File Roller >= 3.6.4, >= 3.8.3, >= 3.9.3

Credit: vulnerability report received from Yorick Koster <yorick.koster AT securify.nl>.

Comment 2 Huzaifa S. Sidhpurwala 2013-07-05 02:34:13 UTC

Not Vulnerable. This issue does not affect the version of file-roller as shipped with Red Hat Enterprise Linux 5 and 6.

Comment 5 Huzaifa S. Sidhpurwala 2013-07-08 08:48:48 UTC
Created file-roller tracking bugs for this issue:

Affects: fedora-all [bug 982134]

Note You need to log in before you can comment on or make changes to this bug.