Absolute path traversal vulnerability in the extract_jar function in jartool.c in FastJar 0.98 allows remote attackers to create or overwrite arbitrary files via a full pathname for a file within a .jar archive, a related issue to CVE-2010-0831. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-3619.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://security.gentoo.org/glsa/glsa-201209-21.xml | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=594497 | |
http://marc.info/?l=oss-security&m=127602564508766&w=2 | mailing list |
http://www.redhat.com/support/errata/RHSA-2011-0025.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=601823 | |
http://www.securityfocus.com/bid/41009 | vdb entry |
http://www.vupen.com/english/advisories/2011/0121 | vdb entry |
http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog | |
http://secunia.com/advisories/42892 | third party advisory |
http://secunia.com/advisories/50786 | third party advisory |
https://launchpad.net/bugs/540575 | exploit |
http://www.osvdb.org/65467 | vdb entry |