MDKSA-2003:073 - Updated unzip packages fix vulnerability

From: Mandrake Linux Security Team (security_at_linux-mandrake.com)
Date: 07/08/03

  • Next message: yan feng: "zkfingerd-2.0.2(the last version)Format String Vulnerabilities"
    Date: 8 Jul 2003 03:51:35 -0000
    To: bugtraq@securityfocus.com
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    ________________________________________________________________________

                    Mandrake Linux Security Update Advisory
    ________________________________________________________________________

    Package name: unzip
    Advisory ID: MDKSA-2003:073
    Date: July 7th, 2003

    Affected versions: 8.2, 9.0, 9.1, Corporate Server 2.1,
                            Multi Network Firewall 8.2
    ________________________________________________________________________

    Problem Description:

     A vulnerability was discovered in unzip 5.50 and earlier that allows
     attackers to overwrite arbitrary files during archive extraction by
     placing non-printable characters between two "." characters. These
     invalid characters are filtered which results in a ".." sequence.
     
     The patch applied to these packages prevents unzip from writing to
     parent directories unless the "-:" command line option is used.
    ________________________________________________________________________

    References:
      
      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0282
      http://marc.theaimsgroup.com/?l=bugtraq&m=105259038503175
    ________________________________________________________________________

    Updated Packages:
      
     Corporate Server 2.1:
     a46b18334a96f2e2a6fa0bba82c3abe5 corporate/2.1/RPMS/unzip-5.50-4.1mdk.i586.rpm
     1b16ee3b0288fbed97d46c3542765d1d corporate/2.1/SRPMS/unzip-5.50-4.1mdk.src.rpm

     Corporate Server 2.1/x86_64:
     96ba0a37cde8a7629bba206f03cc87c8 x86_64/corporate/2.1/RPMS/unzip-5.50-4.1mdk.x86_64.rpm
     1b16ee3b0288fbed97d46c3542765d1d x86_64/corporate/2.1/SRPMS/unzip-5.50-4.1mdk.src.rpm

     Mandrake Linux 8.2:
     2b6f9fa219510dc5d0f3c8a4c5b0ff7a 8.2/RPMS/unzip-5.50-4.1mdk.i586.rpm
     1b16ee3b0288fbed97d46c3542765d1d 8.2/SRPMS/unzip-5.50-4.1mdk.src.rpm

     Mandrake Linux 8.2/PPC:
     f69c968aa6da2d9a8cfa4696b12b3860 ppc/8.2/RPMS/unzip-5.50-4.1mdk.ppc.rpm
     1b16ee3b0288fbed97d46c3542765d1d ppc/8.2/SRPMS/unzip-5.50-4.1mdk.src.rpm

     Mandrake Linux 9.0:
     a46b18334a96f2e2a6fa0bba82c3abe5 9.0/RPMS/unzip-5.50-4.1mdk.i586.rpm
     1b16ee3b0288fbed97d46c3542765d1d 9.0/SRPMS/unzip-5.50-4.1mdk.src.rpm

     Mandrake Linux 9.1:
     27dcadbb90d10e8a707ed0ada31ace4c 9.1/RPMS/unzip-5.50-4.1mdk.i586.rpm
     1b16ee3b0288fbed97d46c3542765d1d 9.1/SRPMS/unzip-5.50-4.1mdk.src.rpm

     Mandrake Linux 9.1/PPC:
     277fed45dc8ae6724b4fadc158783c56 ppc/9.1/RPMS/unzip-5.50-4.1mdk.ppc.rpm
     1b16ee3b0288fbed97d46c3542765d1d ppc/9.1/SRPMS/unzip-5.50-4.1mdk.src.rpm

     Multi Network Firewall 8.2:
     2b6f9fa219510dc5d0f3c8a4c5b0ff7a mnf8.2/RPMS/unzip-5.50-4.1mdk.i586.rpm
     1b16ee3b0288fbed97d46c3542765d1d mnf8.2/SRPMS/unzip-5.50-4.1mdk.src.rpm
    ________________________________________________________________________

    Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
    ________________________________________________________________________

    To upgrade automatically, use MandrakeUpdate or urpmi. The verification
    of md5 checksums and GPG signatures is performed automatically for you.

    A list of FTP mirrors can be obtained from:

      http://www.mandrakesecure.net/en/ftp.php

    All packages are signed by MandrakeSoft for security. You can obtain
    the GPG public key of the Mandrake Linux Security Team by executing:

      gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98

    Please be aware that sometimes it takes the mirrors a few hours to
    update.

    You can view other update advisories for Mandrake Linux at:

      http://www.mandrakesecure.net/en/advisories/

    MandrakeSoft has several security-related mailing list services that
    anyone can subscribe to. Information on these lists can be obtained by
    visiting:

      http://www.mandrakesecure.net/en/mlist.php

    If you want to report vulnerabilities, please contact

      security_linux-mandrake.com

    Type Bits/KeyID Date User ID
    pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
      <security linux-mandrake.com>
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)

    iD8DBQE/Cj/HmqjQ0CJFipgRAjzDAJ4+rBfXgK3s1MwCYt+/wnpUOwwBhgCg7Wgc
    eSn4CvLrtcHE/V8gi9LKVjU=
    =yh0v
    -----END PGP SIGNATURE-----


  • Next message: yan feng: "zkfingerd-2.0.2(the last version)Format String Vulnerabilities"

    Relevant Pages

    • [Full-Disclosure] MDKSA-2003:073 - Updated unzip packages fix vulnerability
      ... A vulnerability was discovered in unzip 5.50 and earlier that allows ... placing non-printable characters between two "." ... Mandrake Linux 8.2/PPC: ... All packages are signed by MandrakeSoft for security. ...
      (Full-Disclosure)
    • MDKSA-2003:073-1 - Updated unzip packages fix vulnerability
      ... A vulnerability was discovered in unzip 5.50 and earlier that allows ... The patch applied to these packages prevents unzip from writing to ... Mandrake Linux 8.2/PPC: ... All packages are signed by MandrakeSoft for security. ...
      (Bugtraq)
    • [Full-Disclosure] MDKSA-2003:073-1 - Updated unzip packages fix vulnerability
      ... A vulnerability was discovered in unzip 5.50 and earlier that allows ... The patch applied to these packages prevents unzip from writing to ... Mandrake Linux 8.2/PPC: ... All packages are signed by MandrakeSoft for security. ...
      (Full-Disclosure)
    • MDKSA-2002:016-1 - squid update
      ... Three security issues were found in the 2.x versions of the Squid proxy ... Denial of Service attack on ther server if the SNMP interface is ... The squid updates for all versions other than Mandrake Linux were ... All packages are signed by MandrakeSoft for security. ...
      (Bugtraq)
    • [Security Announce] MDKSA-2001:086 - tetex update
      ... of some teTeX filters by zen-parse. ... You can get the GPG public key of the Mandrake Linux Security Team at ... of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". ...
      (Bugtraq)