aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2007-02-17 21:55:27 +0800
committersimon <simon@FreeBSD.org>2007-02-17 21:55:27 +0800
commit9c1e7f57cc8d0dbddecf3676f5d24789ca7e6421 (patch)
treea0fa6cf227b11a1dcc114485643fe00d2ca0f935 /security
parent70930bec6009cbad15bdd66bf958bec312e53de5 (diff)
downloadfreebsd-ports-gnome-9c1e7f57cc8d0dbddecf3676f5d24789ca7e6421.tar.gz
freebsd-ports-gnome-9c1e7f57cc8d0dbddecf3676f5d24789ca7e6421.tar.zst
freebsd-ports-gnome-9c1e7f57cc8d0dbddecf3676f5d24789ca7e6421.zip
Document rar -- password prompt buffer overflow vulnerability.
Reminded by: Nate Eldredge
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml46
1 files changed, 46 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index ebf202ae9e4a..99eaae6c1eab 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,52 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="94234e00-be8a-11db-b2ec-000c6ec775d9">
+ <topic>rar -- password prompt buffer overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>rar</name>
+ <range><lt>3.70.b1,1</lt></range>
+ </package>
+ <package>
+ <name>unrar</name>
+ <name>zh-unrar</name>
+ <range><lt>3.70.b1,4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>iDefense reports:</p>
+ <blockquote cite="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=472">
+ <p>Remote exploitation of a stack based buffer overflow
+ vulnerability in RARLabs Unrar may allow an attacker to
+ execute arbitrary code with the privileges of the user
+ opening the archive.</p>
+ <p>Unrar is prone to a stack based buffer overflow when
+ processing specially crafted password protected
+ archives.</p>
+ <p>If users are using the vulnerable command line based
+ unrar, they still need to interact with the program in
+ order to trigger the vulnerability. They must respond to
+ the prompt asking for the password, after which the
+ vulnerability will be triggered. They do not need to enter
+ a correct password, but they must at least push the enter
+ key.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>22447</bid>
+ <cvename>CVE-2007-0855</cvename>
+ <url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=472</url>
+ <url>http://www.rarsoft.com/rarnew.htm</url>
+ </references>
+ <dates>
+ <discovery>2007-02-07</discovery>
+ <entry>2007-02-17</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7fcf1727-be71-11db-b2ec-000c6ec775d9">
<topic>php -- multiple vulnerabilities</topic>
<affects>