Computer Security
[EN] securityvulns.ru no-pyccku


fastjar archiver directory traversal
Published:23.06.2010
Source:
SecurityVulns ID:10948
Type:local
Threat Level:
4/10
Description:Directory traversal during file extraction.
Affected:FASTJAR : FastJar 0.98
CVE:CVE-2010-0831 (Directory traversal vulnerability in the extract_jar function in jartool.c in FastJar 0.98 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in a non-initial pathname component in a filename within a .jar archive, a related issue to CVE-2005-1080. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-3619.)
 CVE-2006-3619 (Directory traversal vulnerability in FastJar 0.93, as used in Gnu GCC 4.1.1 and earlier, and 3.4.6 and earlier, allows user-assisted attackers to overwrite arbitrary files via a .jar file containing filenames with "../" sequences.)
 CVE-2005-1080 (Directory traversal vulnerability in the Java Archive Tool (Jar) utility in J2SE SDK 1.4.2, 1.5 allows remote attackersto write arbitrary files via a .. (dot dot) in filenames in a .jar file.)
Original documentdocumentMANDRIVA, [ MDVSA-2010:122 ] fastjar (23.06.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod