Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200511-10 ] RAR: Format string and buffer overflow vulnerabilities
Date: Sun, 13 Nov 2005 17:48:36
Message-Id: 43777973.9070509@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200511-10
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: RAR: Format string and buffer overflow vulnerabilities
9 Date: November 13, 2005
10 Bugs: #111926
11 ID: 200511-10
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 RAR contains a format string error and a buffer overflow vulnerability
19 that may be used to execute arbitrary code.
20
21 Background
22 ==========
23
24 RAR is a powerful archive manager that can decompress RAR, ZIP and
25 other files, and can create new archives in RAR and ZIP file format.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 app-arch/rar < 3.5.1 >= 3.5.1
34
35 Description
36 ===========
37
38 Tan Chew Keong reported about two vulnerabilities found in RAR:
39
40 * A format string error exists when displaying a diagnostic error
41 message that informs the user of an invalid filename in an UUE/XXE
42 encoded file.
43
44 * Some boundary errors in the processing of malicious ACE archives
45 can be exploited to cause a buffer overflow.
46
47 Impact
48 ======
49
50 A remote attacker could exploit these vulnerabilities by enticing a
51 user to:
52
53 * decode a specially crafted UUE/XXE file, or
54
55 * extract a malicious ACE archive containing a file with an overly
56 long filename.
57
58 When the user performs these actions, the arbitrary code of the
59 attacker's choice will be executed.
60
61 Workaround
62 ==========
63
64 There is no known workaround at this time.
65
66 Resolution
67 ==========
68
69 All RAR users should upgrade to the latest version:
70
71 # emerge --sync
72 # emerge --ask --oneshot --verbose ">=app-arch/rar-3.5.1"
73
74 References
75 ==========
76
77 [ 1 ] RAR Release Notes
78 http://www.rarlabs.com/rarnew.htm
79 [ 2 ] Secunia Research 11/10/2005
80 http://secunia.com/secunia_research/2005-53/advisory/
81
82 Availability
83 ============
84
85 This GLSA and any updates to it are available for viewing at
86 the Gentoo Security Website:
87
88 http://security.gentoo.org/glsa/glsa-200511-10.xml
89
90 Concerns?
91 =========
92
93 Security is a primary focus of Gentoo Linux and ensuring the
94 confidentiality and security of our users machines is of utmost
95 importance to us. Any security concerns should be addressed to
96 security@g.o or alternatively, you may file a bug at
97 http://bugs.gentoo.org.
98
99 License
100 =======
101
102 Copyright 2005 Gentoo Foundation, Inc; referenced text
103 belongs to its owner(s).
104
105 The contents of this document are licensed under the
106 Creative Commons - Attribution / Share Alike license.
107
108 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature