GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Mon Jun 16, 2008 9:26 pm Post subject: [ GLSA 200806-05 ] cbrPager: User-assisted execution of arbi |
|
|
Gentoo Linux Security Advisory
Title: cbrPager: User-assisted execution of arbitrary code (GLSA 200806-05)
Severity: normal
Exploitable: remote
Date: June 16, 2008
Bug(s): #223657
ID: 200806-05
Synopsis
Insecure filename usage in cbrPager may allow for the remote execution of
arbitrary code.
Background
cbrPager is a comic book pager.
Affected Packages
Package: app-misc/cbrpager
Vulnerable: < 0.9.17
Unaffected: >= 0.9.17
Architectures: All supported architectures
Description
Mamoru Tasaka discovered that filenames of the image archives are not
properly sanitized before being passed to decompression utilities like
unrar and unzip, which use the system() libc library call.
Impact
A remote attacker could entice a user to open an archive with a
specially crafted filename, resulting in arbitrary code execution with
the privileges of the user running the application.
Workaround
There is no known workaround at this time.
Resolution
All cbrPager users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-misc/cbrpager-0.9.17" |
References
CVE-2008-2575
Last edited by GLSA on Tue Apr 15, 2014 4:27 am; edited 4 times in total |
|