Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50401
Category:Fedora Local Security Checks
Title:Fedora Core 2 FEDORA-2004-295 (lha)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to lha
announced via advisory FEDORA-2004-295.

Lukasz Wojtow discovered a stack-based buffer overflow in all versions
of lha up to and including version 1.14. A carefully created archive could
allow an attacker to execute arbitrary code when a victim extracts or tests
the archive. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-0769 to this issue.

Buffer overflows were discovered in the command line processing of all
versions of lha up to and including version 1.14. If a malicious user can
trick a victim into passing a specially crafted command line to the lha
command, it is possible that arbitrary code could be executed. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
names CVE-2004-0771 and CVE-2004-0694 to these issues.

Thomas Biege discovered a shell meta character command execution
vulnerability in all versions of lha up to and including 1.14. An attacker
could create a directory with shell meta characters in its name which could
lead to arbitrary command execution. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0745 to
this issue.

Users of lha should update to this updated package

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

bccb95c64b01e506961bdacb3323031b SRPMS/lha-1.14i-14.1.src.rpm
af515d31f9ff998a88383d0651efff68 x86_64/lha-1.14i-14.1.x86_64.rpm
8641060ad39c6bbe14e68014fbe06ce2 x86_64/debug/lha-debuginfo-1.14i-14.1.x86_64.rpm
494c07eccce7cd3f5a040d8fb384eb8b i386/lha-1.14i-14.1.i386.rpm
a8d018efd6c9fe0b8db6f96327557182 i386/debug/lha-debuginfo-1.14i-14.1.i386.rpm

This update can also be installed with the Update Agent
you can
launch the Update Agent with the 'up2date' command.


Solution: Apply the appropriate updates.
http://www.fedoranews.org/updates/FEDORA-2004-295.shtml

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0769
Bugtraq: 20040616 Re: [SECURITY] [DSA 515-1] New lha packages fix several vulnerabilities; Re: (Google Search)
http://marc.info/?l=bugtraq&m=108745217504379&w=2
https://bugzilla.fedora.us/show_bug.cgi?id=1833
http://www.gentoo.org/security/en/glsa/glsa-200409-13.xml
http://lw.ftw.zamosc.pl/lha-exploit.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11047
http://www.redhat.com/support/errata/RHSA-2004-323.html
http://www.redhat.com/support/errata/RHSA-2004-440.html
XForce ISS Database: lha-long-pathname-bo(16917)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16917
Common Vulnerability Exposure (CVE) ID: CVE-2004-0771
BugTraq ID: 10354
http://www.securityfocus.com/bid/10354
Bugtraq: 20040515 lha buffer overflow(s) again (Google Search)
http://www.securityfocus.com/archive/1/363418
Bugtraq: 20040606 Re: [SECURITY] [DSA 515-1] New lha packages fix several (Google Search)
http://marc.info/?l=bugtraq&m=108668791510153
http://bugs.gentoo.org/show_bug.cgi?id=51285
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9595
XForce ISS Database: lha-extractone-bo(16196)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16196
Common Vulnerability Exposure (CVE) ID: CVE-2004-0694
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9981
Common Vulnerability Exposure (CVE) ID: CVE-2004-0745
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11088
XForce ISS Database: lha-metacharacter-command-execution(17198)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17198
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.