[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 394/03 - Mandrake - vulnerability in unzip



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 394/03 dated 09.07.03  Time: 10:33
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Mandrake Security Advisory:

vulnerability in unzip

Detail
====== 

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

                Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name:           unzip
Advisory ID:            MDKSA-2003:073
Date:                   July 7th, 2003

Affected versions:	8.2, 9.0, 9.1, Corporate Server 2.1,
			Multi Network Firewall 8.2
________________________________________________________________________

Problem Description:

 A vulnerability was discovered in unzip 5.50 and earlier that allows
 attackers to overwrite arbitrary files during archive extraction by
 placing non-printable characters between two "." characters.  These
 invalid characters are filtered which results in a ".." sequence.
 
 The patch applied to these packages prevents unzip from writing to
 parent directories unless the "-:" command line option is used.			
________________________________________________________________________

References:
  
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0282
  http://marc.theaimsgroup.com/?l=bugtraq&m=105259038503175
________________________________________________________________________

Updated Packages:
  
 Corporate Server 2.1:
 a46b18334a96f2e2a6fa0bba82c3abe5  corporate/2.1/RPMS/unzip-5.50-4.1mdk.i586.rpm
 1b16ee3b0288fbed97d46c3542765d1d  corporate/2.1/SRPMS/unzip-5.50-4.1mdk.src.rpm

 Corporate Server 2.1/x86_64:
 96ba0a37cde8a7629bba206f03cc87c8  x86_64/corporate/2.1/RPMS/unzip-5.50-4.1mdk.x86_64.rpm
 1b16ee3b0288fbed97d46c3542765d1d  x86_64/corporate/2.1/SRPMS/unzip-5.50-4.1mdk.src.rpm

 Mandrake Linux 8.2:
 2b6f9fa219510dc5d0f3c8a4c5b0ff7a  8.2/RPMS/unzip-5.50-4.1mdk.i586.rpm
 1b16ee3b0288fbed97d46c3542765d1d  8.2/SRPMS/unzip-5.50-4.1mdk.src.rpm

 Mandrake Linux 8.2/PPC:
 f69c968aa6da2d9a8cfa4696b12b3860  ppc/8.2/RPMS/unzip-5.50-4.1mdk.ppc.rpm
 1b16ee3b0288fbed97d46c3542765d1d  ppc/8.2/SRPMS/unzip-5.50-4.1mdk.src.rpm

 Mandrake Linux 9.0:
 a46b18334a96f2e2a6fa0bba82c3abe5  9.0/RPMS/unzip-5.50-4.1mdk.i586.rpm
 1b16ee3b0288fbed97d46c3542765d1d  9.0/SRPMS/unzip-5.50-4.1mdk.src.rpm

 Mandrake Linux 9.1:
 27dcadbb90d10e8a707ed0ada31ace4c  9.1/RPMS/unzip-5.50-4.1mdk.i586.rpm
 1b16ee3b0288fbed97d46c3542765d1d  9.1/SRPMS/unzip-5.50-4.1mdk.src.rpm

 Mandrake Linux 9.1/PPC:
 277fed45dc8ae6724b4fadc158783c56  ppc/9.1/RPMS/unzip-5.50-4.1mdk.ppc.rpm
 1b16ee3b0288fbed97d46c3542765d1d  ppc/9.1/SRPMS/unzip-5.50-4.1mdk.src.rpm

 Multi Network Firewall 8.2:
 2b6f9fa219510dc5d0f3c8a4c5b0ff7a  mnf8.2/RPMS/unzip-5.50-4.1mdk.i586.rpm
 1b16ee3b0288fbed97d46c3542765d1d  mnf8.2/SRPMS/unzip-5.50-4.1mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
________________________________________________________________________

To upgrade automatically, use MandrakeUpdate or urpmi.  The verification
of md5 checksums and GPG signatures is performed automatically for you.

A list of FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team by executing:

  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other update advisories for Mandrake Linux at:

  http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

  http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/Cj/HmqjQ0CJFipgRAjzDAJ4+rBfXgK3s1MwCYt+/wnpUOwwBhgCg7Wgc
eSn4CvLrtcHE/V8gi9LKVjU=
=yh0v
- -----END PGP SIGNATURE-----

- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via EMail to:
uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Mandrake for the information
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBPwvlSIpao72zK539AQE1lAQApkOq2lUT/OjcCc4xqex2qlPI2OdpKRv4
coLa8VDJRynfbO/TbxieytwSy0OBTNp+QTtbjapaGMuNZ3POQK3ct3GpG4WhML/2
RxQjhPYDkK6VNiZfuD9eT7MB8rlCwi6b4E/zmRU6V4cE25WwJL4ZFZE7sKh6r4cE
4HySXR1rrbM=
=z93Z
-----END PGP SIGNATURE-----