Debian DSA-3676-1 : unadf - security update

critical Nessus Plugin ID 93694

Synopsis

The remote Debian host is missing a security-related update.

Description

Tuomas Rasanen discovered two vulnerabilities in unADF, a tool to extract files from an Amiga Disk File dump (.adf) :

- CVE-2016-1243 A stack-based buffer overflow in the function extractTree() might allow an attacker, with control on the content of a ADF file, to execute arbitrary code with the privileges of the program execution.

- CVE-2016-1244 The unADF extractor creates the path in the destination via a mkdir in a system() call. Since there was no sanitization on the input of the filenames, an attacker can directly inject code in the pathnames of archived directories in an ADF file.

Solution

Upgrade the unadf packages.

For the oldstable distribution (wheezy), these problems have been fixed in version 0.7.11a-3+deb7u1.

For the stable distribution (jessie), these problems have been fixed in version 0.7.11a-3+deb8u1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838248

https://security-tracker.debian.org/tracker/CVE-2016-1243

https://security-tracker.debian.org/tracker/CVE-2016-1244

https://packages.debian.org/source/wheezy/unadf

https://packages.debian.org/source/jessie/unadf

https://www.debian.org/security/2016/dsa-3676

Plugin Details

Severity: Critical

ID: 93694

File Name: debian_DSA-3676.nasl

Version: 2.6

Type: local

Agent: unix

Published: 9/26/2016

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:unadf, cpe:/o:debian:debian_linux:7.0, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 9/24/2016

Reference Information

CVE: CVE-2016-1243, CVE-2016-1244

DSA: 3676