Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.703213
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-3213-1)
Summary:The remote host is missing an update for the Debian 'arj' package(s) announced via the DSA-3213-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'arj' package(s) announced via the DSA-3213-1 advisory.

Vulnerability Insight:
Multiple vulnerabilities have been discovered in arj, an open source version of the arj archiver. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2015-0556

Jakub Wilk discovered that arj follows symlinks created during unpacking of an arj archive. A remote attacker could use this flaw to perform a directory traversal attack if a user or automated system were tricked into processing a specially crafted arj archive.

CVE-2015-0557

Jakub Wilk discovered that arj does not sufficiently protect from directory traversal while unpacking an arj archive containing file paths with multiple leading slashes. A remote attacker could use this flaw to write to arbitrary files if a user or automated system were tricked into processing a specially crafted arj archive.

CVE-2015-2782

Jakub Wilk and Guillem Jover discovered a buffer overflow vulnerability in arj. A remote attacker could use this flaw to cause an application crash or, possibly, execute arbitrary code with the privileges of the user running arj.

For the stable distribution (wheezy), these problems have been fixed in version 3.10.22-10+deb7u1.

For the upcoming stable distribution (jessie), these problems have been fixed in version 3.10.22-13.

For the unstable distribution (sid), these problems have been fixed in version 3.10.22-13.

We recommend that you upgrade your arj packages.

Affected Software/OS:
'arj' package(s) on Debian 7.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-0556
BugTraq ID: 71860
http://www.securityfocus.com/bid/71860
Debian Security Information: DSA-3213 (Google Search)
http://www.debian.org/security/2015/dsa-3213
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155011.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154605.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154518.html
https://security.gentoo.org/glsa/201612-15
http://www.mandriva.com/security/advisories?name=MDVSA-2015:201
http://www.openwall.com/lists/oss-security/2015/01/03/5
http://www.openwall.com/lists/oss-security/2015/01/05/9
Common Vulnerability Exposure (CVE) ID: CVE-2015-0557
BugTraq ID: 71895
http://www.securityfocus.com/bid/71895
Common Vulnerability Exposure (CVE) ID: CVE-2015-2782
BugTraq ID: 73413
http://www.securityfocus.com/bid/73413
http://www.openwall.com/lists/oss-security/2015/03/28/5
http://www.openwall.com/lists/oss-security/2015/03/29/1
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.