Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in plexus-archiver
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in plexus-archiver
ID: RHSA-2018:1836-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux
Datum: Di, 12. Juni 2018, 16:55
Referenzen: https://snyk.io/research/zip-slip-vulnerability
https://access.redhat.com/security/cve/CVE-2018-1002200
Applikationen: plexus-archiver

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: plexus-archiver security update
Advisory ID: RHSA-2018:1836-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2018:1836
Issue date: 2018-06-12
CVE Names: CVE-2018-1002200
=====================================================================

1. Summary:

An update for plexus-archiver is now available for Red Hat Enterprise Linux
7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client Optional (v. 7) - noarch
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch
Red Hat Enterprise Linux Server Optional (v. 7) - noarch
Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v.
7) - noarch

3. Description:

The Plexus project provides a full software stack for creating and
executing software projects. Based on the Plexus container, the
applications can utilise component-oriented programming to build modular,
reusable components that can easily be assembled and reused. The
plexus-archiver component provides functions to create and extract
archives.

Security Fix(es):

* plexus-archiver: arbitrary file write vulnerability / arbitrary code
execution using a specially crafted zip file (CVE-2018-1002200)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank Danny Grander (Snyk) for reporting this issue.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1584392 - CVE-2018-1002200 plexus-archiver: arbitrary file write vulnerability
/ arbitrary code execution using a specially crafted zip file

6. Package List:

Red Hat Enterprise Linux Client Optional (v. 7):

Source:
plexus-archiver-2.4.2-5.el7_5.src.rpm

noarch:
plexus-archiver-2.4.2-5.el7_5.noarch.rpm
plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

Source:
plexus-archiver-2.4.2-5.el7_5.src.rpm

noarch:
plexus-archiver-2.4.2-5.el7_5.noarch.rpm
plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

Source:
plexus-archiver-2.4.2-5.el7_5.src.rpm

noarch:
plexus-archiver-2.4.2-5.el7_5.noarch.rpm
plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v.
7):

Source:
plexus-archiver-2.4.2-5.el7_5.src.rpm

noarch:
plexus-archiver-2.4.2-5.el7_5.noarch.rpm
plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

Source:
plexus-archiver-2.4.2-5.el7_5.src.rpm

noarch:
plexus-archiver-2.4.2-5.el7_5.noarch.rpm
plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-1002200
https://access.redhat.com/security/updates/classification/#important
https://snyk.io/research/zip-slip-vulnerability

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBWx/dJ9zjgjWX9erEAQglMw//S++K6QovQX+CKEbQVSAcx57aYAGHqNDJ
X4/dPpwPf5IcHqusNqZY8eO0Btqs/4DKz2p1a3SGJTYrwhO7kMFsUbs+lqCBDMBn
ONT4jws5JmNUCTwtBR3M9EPdyqZ4jTSM2+v/bgR9jiSVBK/3i0t/inPnSFHpPjLA
yewa72dQ/KgMakzqgSGghUrLO9/L6x2NWc+FrV1iz0NDHh2FeQiP0FbXx9fU/8Mw
zg8ISlkFJ3tSSNpMCKyNgu0FVkNGigOmZoQz/amIA2taHjeuOsqWVJPW4lEISliu
fmkXP+M/6SXhdHiJSWNeYPR7hikepF4yQnctx8dg/gJeKnYsZE8/BkjSy7KkXjfV
P/7lKLvN4J5gpy4OgiFqUwxN0OQ/UsCFNuy/NXS90hyrGFIv6+7LUjo8mrZ+OQL1
x9Gqkuvvyat/mdw5lQtGBidyGf3wOE2jvxRsncWSenkCGMwEitT7Ymw/NkNRWZh6
Jd887rDFtbY3KjWHtW8YE/mqaVmAXovrR1pDFrvnXVldpZ3JDML862oz/xI8Nl4x
kHvtUABh/jkaMq34/eN76mefhD+xVPh6+OoJvhlF4Mq+rS3a73gipkgQrJRX8eE4
QKdhUZ/ajbfBd3pRMKsyzVFRmBg2IlrOFqk7rlxVDNM6vykFvpuyFTiZ59fwo4OF
KKsgQEY2Ehg=
=Vfgj
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung