Directory traversal vulnerability in File Roller 3.6.x before 3.6.4, 3.8.x before 3.8.3, and 3.9.x before 3.9.3, when libarchive is used, allows remote attackers to create arbitrary files via a crafted archive that is not properly handled in a "Keep directory structure" action, related to fr-archive-libarchive.c and fr-window.c.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-1906-1 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-updates/2013-07/msg00095.html | vendor advisory broken link |
http://www.ocert.org/advisories/ocert-2013-001.html | third party advisory |
https://git.gnome.org/browse/file-roller/commit/?id=b147281293a8307808475e102a14857055f81631 | third party advisory patch |
http://secunia.com/advisories/54351 | third party advisory not applicable |
http://www.securityfocus.com/bid/61008 | vdb entry third party advisory |
http://archives.neohapsis.com/archives/bugtraq/2013-07/0039.html | mailing list broken link |