lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 2 Jul 2003 18:14:20 -0700
From: Immunix Security Team <security@...unix.com>
To: bugtraq@...urityfocus.com
Subject: Immunix Secured OS 7+ unzip update -- bugtraq

-----------------------------------------------------------------------
	Immunix Secured OS Security Advisory

Packages updated:	unzip
Affected products:	Immunix OS 7+
Bugs fixed:		CAN-2003-0282
Date:			Wed Jul  2 2003
Advisory ID:		IMNX-2003-7+-017-01
Author:			Seth Arnold <sarnold@...unix.com>
-----------------------------------------------------------------------

Description:
  Jelmer has discovered it is possible to bypass unzip's ".." protections
  by including garbage characters between the two periods. A user or
  system administrator unpacking an untrusted .zip file could overwrite
  arbitrary files on the system. This release includes new protectiosn
  to fix this problem.

Package names and locations:
  Precompiled binary packages for Immunix 7+ are available at:
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/unzip-5.50-11_imnx_1.i386.rpm

Immunix OS 7+ md5sums:
  9556c649f1570a9f3d9f13fa18786901  unzip-5.50-11_imnx_1.i386.rpm

GPG verification:                                                               
  Our public key is available at http://download.immunix.org/GPG_KEY

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

  ImmunixOS 6.2 is no longer officially supported.
  ImmunixOS 7.0 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact security@...unix.com.
  Immunix attempts to conform to the RFP vulnerability disclosure protocol
  http://www.wiretrip.net/rfp/policy.html.

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ