Directory traversal vulnerability in KArchive before 5.24, as used in KDE Frameworks, allows remote attackers to write to arbitrary files via a ../ (dot dot slash) in a filename in an archive file, related to KNewsstuff downloads.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2016/07/16/3 | third party advisory mailing list |
https://quickgit.kde.org/?p=karchive.git&a=commit&h=0cb243f64eef45565741b27364cece7d5c349c37 | |
https://www.kde.org/info/security/advisory-20160724-1.txt | exploit mitigation vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00023.html | vendor advisory |
http://www.securityfocus.com/bid/91806 | vdb entry |
http://www.debian.org/security/2016/dsa-3643 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00000.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2016/07/16/2 | mailing list |
http://www.ubuntu.com/usn/USN-3042-1 | patch vendor advisory |
https://usn.ubuntu.com/4100-1/ | vendor advisory |