drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in plexus-archiver
Name: |
Ausführen beliebiger Kommandos in plexus-archiver |
|
ID: |
FEDORA-2018-7a9a2f6ec0 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 28 |
|
Datum: |
Do, 14. Juni 2018, 22:56 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1002200 |
|
Applikationen: |
plexus-archiver |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2018-7a9a2f6ec0 2018-06-14 19:12:51.961401 ------------------------------------------------------------------------------- -
Name : plexus-archiver Product : Fedora 28 Version : 3.5 Release : 6.fc28 URL : http://codehaus-plexus.github.io/plexus-archiver Summary : Plexus Archiver Component Description : The Plexus project seeks to create end-to-end developer tools for writing applications. At the core is the container, which can be embedded or for a full scale application server. There are many reusable components for hibernate, form processing, jndi, i18n, velocity, etc. Plexus also includes an application server which is like a J2EE application server, without all the baggage.
------------------------------------------------------------------------------- - Update Information:
Security fix: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200) A path traversal vulnerability has been discovered in plexus-archiver when extracting a carefully crafted zip file which holds path traversal file names. A remote attacker could use this vulnerability to write files outside the target directory and overwrite existing files with malicious code or vulnerable configurations. Red Hat would like to thank Danny Grander (Snyk) for reporting this issue. External References: https://snyk.io/research/zip-slip-vulnerability ------------------------------------------------------------------------------- - ChangeLog:
* Fri Jun 1 2018 Mikolaj Izdebski <mizdebsk@redhat.com> - 0:3.5-6 - Fix arbitrary file write vulnerability - Resolves: CVE-2018-1002200 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1584392 - CVE-2018-1002200 plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file https://bugzilla.redhat.com/show_bug.cgi?id=1584392 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2018-7a9a2f6ec0' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GZQQJQ2AQA6TR7BYV4DBSHZ3DE7ADWM3/
|
|
|
|