----------------------------------------------------------------------- Immunix Secured OS Security Advisory Packages updated: unzip Affected products: Immunix OS 7+ Bugs fixed: CAN-2003-0282 Date: Wed Jul 2 2003 Advisory ID: IMNX-2003-7+-017-01 Author: Seth Arnold <sarnold@immunix.com> ----------------------------------------------------------------------- Description: Jelmer has discovered it is possible to bypass unzip's ".." protections by including garbage characters between the two periods. A user or system administrator unpacking an untrusted .zip file could overwrite arbitrary files on the system. This release includes new protectiosn to fix this problem. Package names and locations: Precompiled binary packages for Immunix 7+ are available at: http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/unzip-5.50-11_imnx_1.i386.rpm Immunix OS 7+ md5sums: 9556c649f1570a9f3d9f13fa18786901 unzip-5.50-11_imnx_1.i386.rpm GPG verification: Our public key is available at http://download.immunix.org/GPG_KEY NOTE: Ibiblio is graciously mirroring our updates, so if the links above are slow, please try: ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/ or one of the many mirrors available at: http://www.ibiblio.org/pub/Linux/MIRRORS.html ImmunixOS 6.2 is no longer officially supported. ImmunixOS 7.0 is no longer officially supported. Contact information: To report vulnerabilities, please contact security@immunix.com. Immunix attempts to conform to the RFP vulnerability disclosure protocol http://www.wiretrip.net/rfp/policy.html.
Attachment:
pgp00370.pgp
Description: PGP signature