Mandriva Linux Security Advisory : arj (MDVSA-2015:201)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing a security update.

Description :

Multiple vulnerabilities has been found and corrected in arj :

Jakub Wilk discovered that arj follows symlinks created during
unpacking of an arj archive. A remote attacker could use this flaw to
perform a directory traversal attack if a user or automated system
were tricked into processing a specially crafted arj archive
(CVE-2015-0556).

Jakub Wilk discovered that arj does not sufficiently protect from
directory traversal while unpacking an arj archive containing file
paths with multiple leading slashes. A remote attacker could use this
flaw to write to arbitrary files if a user or automated system were
tricked into processing a specially crafted arj archive
(CVE-2015-0557).

Jakub Wilk and Guillem Jover discovered a buffer overflow
vulnerability in arj. A remote attacker could use this flaw to cause
an application crash or, possibly, execute arbitrary code with the
privileges of the user running arj (CVE-2015-2782).

The updated packages provides a solution for these security issues.

Solution :

Update the affected arj package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 82736 ()

Bugtraq ID: 71860
71895
73413

CVE ID: CVE-2015-0556
CVE-2015-0557
CVE-2015-2782

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now