[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3213-1 arj -- arj

ID: oval:org.secpod.oval:def:602028Date: (C)2015-04-07   (M)2022-09-21
Class: PATCHFamily: unix




Multiple vulnerabilities have been discovered in arj, an open source version of the arj archiver. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-0556 Jakub Wilk discovered that arj follows symlinks created during unpacking of an arj archive. A remote attacker could use this flaw to perform a directory traversal attack if a user or automated system were tricked into processing a specially crafted arj archive. CVE-2015-0557 Jakub Wilk discovered that arj does not sufficiently protect from directory traversal while unpacking an arj archive containing file paths with multiple leading slashes. A remote attacker could use this flaw to write to arbitrary files if a user or automated system were tricked into processing a specially crafted arj archive. CVE-2015-2782 Jakub Wilk and Guillem Jover discovered a buffer overflow vulnerability in arj. A remote attacker could use this flaw to cause an application crash or, possibly, execute arbitrary code with the privileges of the user running arj.

Platform:
Debian 7.0
Product:
arj
Reference:
DSA-3213-1
CVE-2015-0556
CVE-2015-0557
CVE-2015-2782
CVE    3
CVE-2015-0556
CVE-2015-0557
CVE-2015-2782
CPE    2
cpe:/a:arj_software_inc:arj
cpe:/o:debian:debian_linux:7.x

© SecPod Technologies