Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in plexus-archiver
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in plexus-archiver
ID: FEDORA-2018-6c55e1f79c
Distribution: Fedora
Plattformen: Fedora 27
Datum: Do, 14. Juni 2018, 22:52
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1002200
Applikationen: plexus-archiver

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2018-6c55e1f79c
2018-06-14 18:14:18.568902
-------------------------------------------------------------------------------
-

Name : plexus-archiver
Product : Fedora 27
Version : 3.4
Release : 4.fc27
URL : http://codehaus-plexus.github.io/plexus-archiver
Summary : Plexus Archiver Component
Description :
The Plexus project seeks to create end-to-end developer tools for
writing applications. At the core is the container, which can be
embedded or for a full scale application server. There are many
reusable components for hibernate, form processing, jndi, i18n,
velocity, etc. Plexus also includes an application server which
is like a J2EE application server, without all the baggage.

-------------------------------------------------------------------------------
-
Update Information:

Security fix: arbitrary file write vulnerability / arbitrary code execution
using a specially crafted zip file (CVE-2018-1002200) A path traversal
vulnerability has been discovered in plexus-archiver when extracting a
carefully
crafted zip file which holds path traversal file names. A remote attacker could
use this vulnerability to write files outside the target directory and
overwrite
existing files with malicious code or vulnerable configurations. Red Hat would
like to thank Danny Grander (Snyk) for reporting this issue. External
References: https://snyk.io/research/zip-slip-vulnerability
-------------------------------------------------------------------------------
-
ChangeLog:

* Fri Jun 1 2018 Mikolaj Izdebski <mizdebsk@redhat.com> - 0:3.4-4
- Fix arbitrary file write vulnerability
- Resolves: CVE-2018-1002200
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1584392 - CVE-2018-1002200 plexus-archiver: arbitrary file write
vulnerability / arbitrary code execution using a specially crafted zip file
https://bugzilla.redhat.com/show_bug.cgi?id=1584392
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-6c55e1f79c' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7XAAUCTHL2PDJHW5Q2IYATOAXX4AFFU/
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung