Summary
The remote host is missing an update to unarj
announced via advisory DSA 652-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20652-1
Insight
Several vulnerabilities have been discovered in unarj, a non-free ARJ unarchive utility. The Common Vulnerabilities and Exposures Project identifies the following vulnerabilities:
CVE-2004-0947
A buffer overflow has been discovered when handling long file names contained in an archive. An attacker could create a specially crafted archive which could cause unarj to crash or possibly execute arbitrary code when being extracted by a victim.
CVE-2004-1027
A directory traversal vulnerability has been found so that an attacker could create a specially crafted archive which would create files in the parent directory when being extracted by a victim. When used recursively, this vulnerability could be used to overwrite critical system files and programs.
For the stable distribution (woody) these problems have been fixed in version 2.43-3woody1.
For the unstable distribution (sid) these problems don't apply since unstable/non-free does not contain the unarj package.
We recommend that you upgrade your unarj package.
Severity
Classification
-
CVE CVE-2004-0947, CVE-2004-1027 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities