Gentoo Archives: gentoo-announce

From: Thomas Deutschmann <whissi@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201708-05 ] RAR and UnRAR: User-assisted execution of arbitrary code
Date: Mon, 21 Aug 2017 01:14:21
Message-Id: 88b51cb0-1938-0ddb-d906-8aa9d7c422c6@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201708-05
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: RAR and UnRAR: User-assisted execution of arbitrary code
9 Date: August 21, 2017
10 Bugs: #622342, #622382
11 ID: 201708-05
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 An integer overflow in RAR and UnRAR might allow remote attackers to
19 execute arbitrary code.
20
21 Background
22 ==========
23
24 RAR and UnRAR provide command line interfaces for compressing and
25 decompressing RAR files.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 app-arch/rar < 5.5.0_beta4_p20170628>= 5.5.0_beta4_p20170628
34 2 app-arch/unrar < 5.5.5 >= 5.5.5
35 -------------------------------------------------------------------
36 2 affected packages
37
38 Description
39 ===========
40
41 A VMSF_DELTA memory corruption was discovered in which an integer
42 overflow can be caused in DataSize+CurChannel. The result is a negative
43 value of the "DestPos" variable which allows writing out of bounds when
44 setting Mem[DestPos].
45
46 Impact
47 ======
48
49 A remote attacker, by enticing a user to open a specially crafted
50 archive, could execute arbitrary code with the privileges of the
51 process.
52
53 Workaround
54 ==========
55
56 There is no known workaround at this time.
57
58 Resolution
59 ==========
60
61 All RAR users should upgrade to the latest version:
62
63 # emerge --sync
64 # emerge --ask --oneshot -v ">=app-arch/rar-5.5.0_beta4_p20170628"
65
66 All UnRAR users should upgrade to the latest version:
67
68 # emerge --sync
69 # emerge --ask --oneshot --verbose ">=app-arch/unrar-5.5.5"
70
71 References
72 ==========
73
74 [ 1 ] CVE-2012-6706
75 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6706
76
77 Availability
78 ============
79
80 This GLSA and any updates to it are available for viewing at
81 the Gentoo Security Website:
82
83 https://security.gentoo.org/glsa/201708-05
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users' machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 https://bugs.gentoo.org.
93
94 License
95 =======
96
97 Copyright 2017 Gentoo Foundation, Inc; referenced text
98 belongs to its owner(s).
99
100 The contents of this document are licensed under the
101 Creative Commons - Attribution / Share Alike license.
102
103 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature