Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 8 Jul 2013 10:31:50 +0200
From: Daniele Bianco <danbia@...rt.org>
To: oss-security@...ts.openwall.com, ocert-announce@...ts.ocert.org,
        bugtraq@...urityfocus.com
Subject: [oCERT-2013-001] File Roller path sanitization errors


#2013-001 File Roller path sanitization errors

Description:

The File Roller archive manager for the GNOME desktop suffers from a
path traversal vulnerability caused by insufficient path sanitization.

A specially crafted archive file can be used to trigger creation of
arbitrary files in any location, writable by the user executing the extraction,
outside the current working directory. This behaviour is triggered when the
option 'Keep directory structure' is selected from the application 'Extract'
dialog.

The issue is present on File Roller installations which have been
compiled with libarchive support, used to handle tar, cpio, lha, 7zip, ar
archiving formats and ISO images. The libarchive support is enabled by
default.

Affected version:
File Roller >= 3.6.0, >= 3.8.0, >= 3.9.1

Fixed version:
File Roller >= 3.6.4, >= 3.8.3, >= 3.9.3

Credit: vulnerability report received from Yorick Koster 
        <yorick.koster AT securify.nl>

CVE: CVE-2013-4668

Timeline:
2013-05-16: vulnerability report received
2013-05-20: contacted File Roller maintainer
2013-05-27: maintainer provides patch for review
2013-05-28: reporter confirms patch effectiveness
2013-06-11: oCERT confirms patch effectiveness
2013-06-17: File Roller 3.9.3 released
2013-07-02: File Roller 3.6.4, 3.8.3 released
2013-07-04: contacted affected vendors
2013-07-04: assigned CVE
2013-07-08: advisory release

References:
http://fileroller.sourceforge.net
http://git.gnome.org/browse/file-roller
https://git.gnome.org/browse/file-roller/commit/?id=b147281293a8307808475e102a14857055f81631

Permalink:
http://www.ocert.org/advisories/ocert-2013-001.html

--
  Daniele Bianco      Open Source Computer Security Incident Response Team
  <danbia@...rt.org>                                  http://www.ocert.org

  GPG Key 0x9544A497
  GPG Key fingerprint = 88A7 43F4 F28F 1B9D 6F2D  4AC5 AE75 822E 9544 A497

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.