GLSA-200511-10 : RAR: Format string and buffer overflow vulnerabilities

medium Nessus Plugin ID 20197

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200511-10 (RAR: Format string and buffer overflow vulnerabilities)

Tan Chew Keong reported about two vulnerabilities found in RAR:
A format string error exists when displaying a diagnostic error message that informs the user of an invalid filename in an UUE/XXE encoded file.
Some boundary errors in the processing of malicious ACE archives can be exploited to cause a buffer overflow.
Impact :

A remote attacker could exploit these vulnerabilities by enticing a user to:
decode a specially crafted UUE/XXE file, or extract a malicious ACE archive containing a file with an overly long filename.
When the user performs these actions, the arbitrary code of the attacker's choice will be executed.
Workaround :

There is no known workaround at this time.

Solution

All RAR users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=app-arch/rar-3.5.1'

See Also

https://www.rarlab.com/rarnew.htm

http://www.nessus.org/u?3b12d9a7

https://security.gentoo.org/glsa/200511-10

Plugin Details

Severity: Medium

ID: 20197

File Name: gentoo_GLSA-200511-10.nasl

Version: 1.15

Type: local

Published: 11/15/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:rar, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 11/13/2005

Reference Information

GLSA: 200511-10