Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200702-04 ] RAR, UnRAR: Buffer overflow
Date: Tue, 13 Feb 2007 23:46:06
Message-Id: 20070213232524.GC32327@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200702-04
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: RAR, UnRAR: Buffer overflow
9 Date: February 13, 2007
10 Bugs: #166440
11 ID: 200702-04
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 RAR and UnRAR contain a buffer overflow allowing the execution of
19 arbitrary code.
20
21 Background
22 ==========
23
24 RAR and UnRAR provide command line interfaces for compressing and
25 decompressing RAR files.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 app-arch/rar < 3.7.0_beta1 >= 3.7.0_beta1
34 2 app-arch/unrar < 3.7.3 >= 3.7.3
35 -------------------------------------------------------------------
36 2 affected packages on all of their supported architectures.
37 -------------------------------------------------------------------
38
39 Description
40 ===========
41
42 RAR and UnRAR contain a boundary error when processing
43 password-protected archives that could result in a stack-based buffer
44 overflow.
45
46 Impact
47 ======
48
49 A remote attacker could entice a user to process a specially crafted
50 password-protected archive and execute arbitrary code with the rights
51 of the user uncompressing the archive.
52
53 Workaround
54 ==========
55
56 There is no known workaround at this time.
57
58 Resolution
59 ==========
60
61 All UnRAR users should upgrade to the latest version:
62
63 # emerge --sync
64 # emerge --ask --oneshot --verbose ">=app-arch/rar-3.7.3"
65
66 All RAR users should upgrade to the latest version:
67
68 # emerge --sync
69 # emerge --ask --oneshot --verbose ">=app-arch/rar-3.7.0_beta1"
70
71 References
72 ==========
73
74 [ 1 ] CVE-2007-0855
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0855
76
77 Availability
78 ============
79
80 This GLSA and any updates to it are available for viewing at
81 the Gentoo Security Website:
82
83 http://security.gentoo.org/glsa/glsa-200702-04.xml
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 http://bugs.gentoo.org.
93
94 License
95 =======
96
97 Copyright 2007 Gentoo Foundation, Inc; referenced text
98 belongs to its owner(s).
99
100 The contents of this document are licensed under the
101 Creative Commons - Attribution / Share Alike license.
102
103 http://creativecommons.org/licenses/by-sa/2.5