Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A vulnerability was discovered in unzip 5.50 and earlier that allows
attackers to overwrite arbitrary files during archive extraction by
placing non-printable characters between two "." characters. These
invalid characters are filtered which results in a ".." sequence.
The patch applied to these packages prevents unzip from writing to
parent directories unless the "-:" command line option is used.
Update:
Ben Laurie found that the original patch used to fix this issue missed
a case where the path component included a quoted slash. An updated
patch was used to build these packages.
Updated Packages |
Mandrakelinux 8.2
da00ebf987ca4200ce2ed926bf4adaeb 8.2/RPMS/unzip-5.50-4.2mdk.i586.rpm ece7c5edb30cb80c00e902a61126e68d 8.2/SRPMS/unzip-5.50-4.2mdk.src.rpm
Mandrakelinux 8.2/PPC
07252553006b6d428289f4fdfadf46fd ppc/8.2/RPMS/unzip-5.50-4.2mdk.ppc.rpm ece7c5edb30cb80c00e902a61126e68d ppc/8.2/SRPMS/unzip-5.50-4.2mdk.src.rpm
Mandrakelinux 9.0
eb83a1f819f0407da2a6abe8f9470e6d 9.0/RPMS/unzip-5.50-4.2mdk.i586.rpm ece7c5edb30cb80c00e902a61126e68d 9.0/SRPMS/unzip-5.50-4.2mdk.src.rpm
Mandrakelinux 9.1
32f6a6726eb9cfe5d76aec74a71228d1 9.1/RPMS/unzip-5.50-4.2mdk.i586.rpm ece7c5edb30cb80c00e902a61126e68d 9.1/SRPMS/unzip-5.50-4.2mdk.src.rpm
Mandrakelinux 9.1/PPC
c4cc4eb7e92026ce5264daa57a42ce98 ppc/9.1/RPMS/unzip-5.50-4.2mdk.ppc.rpm ece7c5edb30cb80c00e902a61126e68d ppc/9.1/SRPMS/unzip-5.50-4.2mdk.src.rpm
Multi Network Firewall 8.2
da00ebf987ca4200ce2ed926bf4adaeb mnf8.2/RPMS/unzip-5.50-4.2mdk.i586.rpm ece7c5edb30cb80c00e902a61126e68d mnf8.2/SRPMS/unzip-5.50-4.2mdk.src.rpm
Corporate Server 2.1
eb83a1f819f0407da2a6abe8f9470e6d corporate/2.1/RPMS/unzip-5.50-4.2mdk.i586.rpm ece7c5edb30cb80c00e902a61126e68d corporate/2.1/SRPMS/unzip-5.50-4.2mdk.src.rpm
Corporate Server 2.1/X86_64
53ecb5284909bec78ef0b570dfbabf89 x86_64/corporate/2.1/RPMS/unzip-5.50-4.2mdk.x86_64.rpm ece7c5edb30cb80c00e902a61126e68d x86_64/corporate/2.1/SRPMS/unzip-5.50-4.2mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0282
http://marc.theaimsgroup.com/?l=bugtraq&m=105259038503175
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.