Note:
This project will be discontinued after December 13, 2021. [more]
2010-06-18
Directory traversal vulnerability in the extract_jar function in jartool.c in FastJar 0.98 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in a non-initial pathname component in a filename within a .jar archive, a related issue to CVE-2005-1080. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-3619.
Products | Fastjar |
Type | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22) |
First patch | - None (likely due to unavailable code) |
Links |
• http://www.mandriva.com/security/advisories?name=MDVSA-2010:122
• http://www.osvdb.org/65467 • http://www.securityfocus.com/bid/41006 • http://www.vupen.com/english/advisories/2011/0121 • http://marc.info/?l=oss-security&m=127602564508766&w=2
• http://marc.info/?l=oss-security&m=127603032617644&w=2
• https://bugzilla.redhat.com/show_bug.cgi?id=601823 • https://launchpad.net/bugs/540575 • http://marc.info/?l=oss-security&m=127602731712034&w=2 • http://secunia.com/advisories/50786 • http://security.gentoo.org/glsa/glsa-201209-21.xml • http://secunia.com/advisories/42892 • http://www.vupen.com/english/advisories/2010/1553 • http://www.redhat.com/support/errata/RHSA-2011-0025.html • http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog • https://bugzilla.redhat.com/show_bug.cgi?id=594497 |