Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 83057 - app-arch/unace: Directory Traversal and Buffer Overflow Vulnerabilities
Summary: app-arch/unace: Directory Traversal and Buffer Overflow Vulnerabilities
Status: RESOLVED DUPLICATE of bug 81958
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/14359/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-02-23 04:47 UTC by Jean-François Brunette (RETIRED)
Modified: 2005-07-17 13:06 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jean-François Brunette (RETIRED) gentoo-dev 2005-02-23 04:47:41 UTC
Description:
Ulf H
Comment 1 Jean-François Brunette (RETIRED) gentoo-dev 2005-02-23 04:47:41 UTC
Description:
Ulf Härnhammar has discovered some vulnerabilities in unace, which can be exploited by malicious people to compromise a user's system.

1) An input validation error when extracting files compressed with ACE (.ace) makes it possible extract files to arbitrary locations outside the specified directory using the "../" directory traversal sequence or an absolute path.

2) Some boundary errors in the processing of malicious ACE archives can be exploited to cause a buffer overflow by tricking a user into extracting, testing, or listing a specially crafted archive.

Successful exploitation may allow execution of arbitrary code.

The vulnerabilities have been confirmed in version 1.2b. Other versions may also be affected.

Solution:
Do not extract, list, or test untrusted ACE archives.

Use another product.
Comment 2 Luke Macken (RETIRED) gentoo-dev 2005-02-23 05:12:20 UTC

*** This bug has been marked as a duplicate of 81958 ***