Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A vulnerability was discovered in unzip 5.50 and earlier that allows
attackers to overwrite arbitrary files during archive extraction by
placing non-printable characters between two "." characters. These
invalid characters are filtered which results in a ".." sequence.
The patch applied to these packages prevents unzip from writing to
parent directories unless the "-:" command line option is used.
Updated Packages |
Mandrakelinux 8.2
2b6f9fa219510dc5d0f3c8a4c5b0ff7a 8.2/RPMS/unzip-5.50-4.1mdk.i586.rpm 1b16ee3b0288fbed97d46c3542765d1d 8.2/SRPMS/unzip-5.50-4.1mdk.src.rpm
Mandrakelinux 8.2/PPC
f69c968aa6da2d9a8cfa4696b12b3860 ppc/8.2/RPMS/unzip-5.50-4.1mdk.ppc.rpm 1b16ee3b0288fbed97d46c3542765d1d ppc/8.2/SRPMS/unzip-5.50-4.1mdk.src.rpm
Mandrakelinux 9.0
a46b18334a96f2e2a6fa0bba82c3abe5 9.0/RPMS/unzip-5.50-4.1mdk.i586.rpm 1b16ee3b0288fbed97d46c3542765d1d 9.0/SRPMS/unzip-5.50-4.1mdk.src.rpm
Mandrakelinux 9.1
27dcadbb90d10e8a707ed0ada31ace4c 9.1/RPMS/unzip-5.50-4.1mdk.i586.rpm 1b16ee3b0288fbed97d46c3542765d1d 9.1/SRPMS/unzip-5.50-4.1mdk.src.rpm
Mandrakelinux 9.1/PPC
277fed45dc8ae6724b4fadc158783c56 ppc/9.1/RPMS/unzip-5.50-4.1mdk.ppc.rpm 1b16ee3b0288fbed97d46c3542765d1d ppc/9.1/SRPMS/unzip-5.50-4.1mdk.src.rpm
Multi Network Firewall 8.2
2b6f9fa219510dc5d0f3c8a4c5b0ff7a mnf8.2/RPMS/unzip-5.50-4.1mdk.i586.rpm 1b16ee3b0288fbed97d46c3542765d1d mnf8.2/SRPMS/unzip-5.50-4.1mdk.src.rpm
Corporate Server 2.1
a46b18334a96f2e2a6fa0bba82c3abe5 corporate/2.1/RPMS/unzip-5.50-4.1mdk.i586.rpm 1b16ee3b0288fbed97d46c3542765d1d corporate/2.1/SRPMS/unzip-5.50-4.1mdk.src.rpm
Corporate Server 2.1/X86_64
96ba0a37cde8a7629bba206f03cc87c8 x86_64/corporate/2.1/RPMS/unzip-5.50-4.1mdk.x86_64.rpm 1b16ee3b0288fbed97d46c3542765d1d x86_64/corporate/2.1/SRPMS/unzip-5.50-4.1mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0282
http://marc.theaimsgroup.com/?l=bugtraq&m=105259038503175
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.