SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Zip Vendors:   Info-ZIP
(Red Hat Issues Fix) Zip Buffer Overflow in Recursive Directory Compression Lets Local Users Execute Arbitrary Code
SecurityTracker Alert ID:  1012604
SecurityTracker URL:  http://securitytracker.com/id/1012604
CVE Reference:   CVE-2004-1010   (Links to External Site)
Date:  Dec 16 2004
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.3
Description:   A buffer overflow vulnerability was reported in Zip. A local user may be able to cause arbitrary code to be executed.

HexView reported that a local user can create a long path that, when compressed by Zip, will trigger a buffer overflow and possibly execute arbitrary code contained in a directory name or file name. The code will execute with the privileges of the user or process running Zip.

The original advisory is available at:

http://www.hexview.com/docs/20041103-1.txt

Impact:   A local user may be able to cause arbitrary code to be executed.
Solution:   Red Hat has released a fix.

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/zip-2.3-10.1.src.rpm
b062c345c3d6c56ed1c042145643c8c8 zip-2.3-10.1.src.rpm

i386:
a06a150a5652173a8309cca26cc3c70f zip-2.3-10.1.i386.rpm

ia64:
6cab305bdaca789e53e760184050fab9 zip-2.3-10.1.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/zip-2.3-10.1.src.rpm
b062c345c3d6c56ed1c042145643c8c8 zip-2.3-10.1.src.rpm

ia64:
6cab305bdaca789e53e760184050fab9 zip-2.3-10.1.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/zip-2.3-10.1.src.rpm
b062c345c3d6c56ed1c042145643c8c8 zip-2.3-10.1.src.rpm

i386:
a06a150a5652173a8309cca26cc3c70f zip-2.3-10.1.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/zip-2.3-10.1.src.rpm
b062c345c3d6c56ed1c042145643c8c8 zip-2.3-10.1.src.rpm

i386:
a06a150a5652173a8309cca26cc3c70f zip-2.3-10.1.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/zip-2.3-16.1.src.rpm
aa360ac25cf50772fd010cf2d1d91db7 zip-2.3-16.1.src.rpm

i386:
41fec60bfbbca5266e4bbff55f42031a zip-2.3-16.1.i386.rpm

ia64:
0b8464b40ec9d081dd36ab9d699a4c1c zip-2.3-16.1.ia64.rpm

ppc:
787ad3673b90f4fcb0d47c815ca984f6 zip-2.3-16.1.ppc.rpm

s390:
97c709a606b3cec173833833b24c704b zip-2.3-16.1.s390.rpm

s390x:
4d1f10e6b1e4247cb037eb42c8fcc796 zip-2.3-16.1.s390x.rpm

x86_64:
1ed34c119e86a0c739c1c5bb706ffb69 zip-2.3-16.1.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/zip-2.3-16.1.src.rpm
aa360ac25cf50772fd010cf2d1d91db7 zip-2.3-16.1.src.rpm

i386:
41fec60bfbbca5266e4bbff55f42031a zip-2.3-16.1.i386.rpm

x86_64:
1ed34c119e86a0c739c1c5bb706ffb69 zip-2.3-16.1.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/zip-2.3-16.1.src.rpm
aa360ac25cf50772fd010cf2d1d91db7 zip-2.3-16.1.src.rpm

i386:
41fec60bfbbca5266e4bbff55f42031a zip-2.3-16.1.i386.rpm

ia64:
0b8464b40ec9d081dd36ab9d699a4c1c zip-2.3-16.1.ia64.rpm

x86_64:
1ed34c119e86a0c739c1c5bb706ffb69 zip-2.3-16.1.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/zip-2.3-16.1.src.rpm
aa360ac25cf50772fd010cf2d1d91db7 zip-2.3-16.1.src.rpm

i386:
41fec60bfbbca5266e4bbff55f42031a zip-2.3-16.1.i386.rpm

ia64:
0b8464b40ec9d081dd36ab9d699a4c1c zip-2.3-16.1.ia64.rpm

x86_64:
1ed34c119e86a0c739c1c5bb706ffb69 zip-2.3-16.1.x86_64.rpm

Vendor URL:  www.info-zip.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  2.1, 3

Message History:   This archive entry is a follow-up to the message listed below.
Nov 4 2004 Zip Buffer Overflow in Recursive Directory Compression Lets Local Users Execute Arbitrary Code



 Source Message Contents

Subject:  [RHSA-2004:634-01] Updated zip package fixes security issue


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated zip package fixes security issue
Advisory ID:       RHSA-2004:634-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2004-634.html
Issue date:        2004-12-16
Updated on:        2004-12-16
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2004-1010
- ---------------------------------------------------------------------

1. Summary:

An updated zip package that fixes a buffer overflow vulnerability is now
available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The zip program is an archiving utility which can create ZIP-compatible
archives.

A buffer overflow bug has been discovered in zip when handling long file
names.  An attacker could create a specially crafted path which could
cause zip to crash or execute arbitrary instructions.  The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-1010 to this issue.

Users of zip should upgrade to this updated package, which contains
backported patches and is not vulnerable to this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

138228 - CAN-2004-1010 buffer overflow when creating archive containing very long filenames.

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/zip-2.3-10.1.src.rpm
b062c345c3d6c56ed1c042145643c8c8  zip-2.3-10.1.src.rpm

i386:
a06a150a5652173a8309cca26cc3c70f  zip-2.3-10.1.i386.rpm

ia64:
6cab305bdaca789e53e760184050fab9  zip-2.3-10.1.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/zip-2.3-10.1.src.rpm
b062c345c3d6c56ed1c042145643c8c8  zip-2.3-10.1.src.rpm

ia64:
6cab305bdaca789e53e760184050fab9  zip-2.3-10.1.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/zip-2.3-10.1.src.rpm
b062c345c3d6c56ed1c042145643c8c8  zip-2.3-10.1.src.rpm

i386:
a06a150a5652173a8309cca26cc3c70f  zip-2.3-10.1.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/zip-2.3-10.1.src.rpm
b062c345c3d6c56ed1c042145643c8c8  zip-2.3-10.1.src.rpm

i386:
a06a150a5652173a8309cca26cc3c70f  zip-2.3-10.1.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/zip-2.3-16.1.src.rpm
aa360ac25cf50772fd010cf2d1d91db7  zip-2.3-16.1.src.rpm

i386:
41fec60bfbbca5266e4bbff55f42031a  zip-2.3-16.1.i386.rpm

ia64:
0b8464b40ec9d081dd36ab9d699a4c1c  zip-2.3-16.1.ia64.rpm

ppc:
787ad3673b90f4fcb0d47c815ca984f6  zip-2.3-16.1.ppc.rpm

s390:
97c709a606b3cec173833833b24c704b  zip-2.3-16.1.s390.rpm

s390x:
4d1f10e6b1e4247cb037eb42c8fcc796  zip-2.3-16.1.s390x.rpm

x86_64:
1ed34c119e86a0c739c1c5bb706ffb69  zip-2.3-16.1.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/zip-2.3-16.1.src.rpm
aa360ac25cf50772fd010cf2d1d91db7  zip-2.3-16.1.src.rpm

i386:
41fec60bfbbca5266e4bbff55f42031a  zip-2.3-16.1.i386.rpm

x86_64:
1ed34c119e86a0c739c1c5bb706ffb69  zip-2.3-16.1.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/zip-2.3-16.1.src.rpm
aa360ac25cf50772fd010cf2d1d91db7  zip-2.3-16.1.src.rpm

i386:
41fec60bfbbca5266e4bbff55f42031a  zip-2.3-16.1.i386.rpm

ia64:
0b8464b40ec9d081dd36ab9d699a4c1c  zip-2.3-16.1.ia64.rpm

x86_64:
1ed34c119e86a0c739c1c5bb706ffb69  zip-2.3-16.1.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/zip-2.3-16.1.src.rpm
aa360ac25cf50772fd010cf2d1d91db7  zip-2.3-16.1.src.rpm

i386:
41fec60bfbbca5266e4bbff55f42031a  zip-2.3-16.1.i386.rpm

ia64:
0b8464b40ec9d081dd36ab9d699a4c1c  zip-2.3-16.1.ia64.rpm

x86_64:
1ed34c119e86a0c739c1c5bb706ffb69  zip-2.3-16.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package

7. References:

http://lists.netsys.com/pipermail/full-disclosure/2004-November/028379.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1010

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBwfomXlSAg2UNWIIRAmktAJ45cOaDId4VILoYxHocKcIBRhLt+QCfSLte
NjnZ24Skq6//LYtkhifJslA=
=j5+r
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC