what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-068

Mandriva Linux Security Advisory 2008-068
Posted Mar 19, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Tavis Ormandy of Google Security discovered an invalid pointer flaw in unzip that could lead to the execution of arbitrary code with the privileges of the user running unzip.

tags | advisory, arbitrary
systems | linux, mandriva
advisories | CVE-2008-0888
SHA-256 | 6241bf31366b86f9214c0b04b8389979ede508c055d9251b1a4119710eb80ccc

Mandriva Linux Security Advisory 2008-068

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:068
http://www.mandriva.com/security/
_______________________________________________________________________

Package : unzip
Date : March 18, 2008
Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

Tavis Ormandy of Google Security discovered an invalid pointer flaw
in unzip that could lead to the execution of arbitrary code with the
privileges of the user running unzip.

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
8ab02d1ae7407c44cd1a1b9ec6c9cf61 2007.0/i586/unzip-5.52-3.1mdv2007.0.i586.rpm
57f5147c837b81e917a8d5651360e2cc 2007.0/SRPMS/unzip-5.52-3.1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
b7e80efd92608ae0a78a984e34bb8eff 2007.0/x86_64/unzip-5.52-3.1mdv2007.0.x86_64.rpm
57f5147c837b81e917a8d5651360e2cc 2007.0/SRPMS/unzip-5.52-3.1mdv2007.0.src.rpm

Mandriva Linux 2007.1:
57dde2a4dc7f38ebcdff410b370f61f4 2007.1/i586/unzip-5.52-3.1mdv2007.1.i586.rpm
d8415ea1276040828fe1d413ee286563 2007.1/SRPMS/unzip-5.52-3.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
5cb9ca374ed552c88db439e6cb940e33 2007.1/x86_64/unzip-5.52-3.1mdv2007.1.x86_64.rpm
d8415ea1276040828fe1d413ee286563 2007.1/SRPMS/unzip-5.52-3.1mdv2007.1.src.rpm

Mandriva Linux 2008.0:
994efe8ccdbc3513e8095dd35065905c 2008.0/i586/unzip-5.52-3.1mdv2008.0.i586.rpm
166137b40bd05dcd93a014d9ce0bb34f 2008.0/SRPMS/unzip-5.52-3.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
38d80bbd775b4d190adc8c4b86cc77aa 2008.0/x86_64/unzip-5.52-3.1mdv2008.0.x86_64.rpm
166137b40bd05dcd93a014d9ce0bb34f 2008.0/SRPMS/unzip-5.52-3.1mdv2008.0.src.rpm

Corporate 3.0:
fc663b970f8876e8f83a8d93acf019c0 corporate/3.0/i586/unzip-5.50-9.4.C30mdk.i586.rpm
dafe241ea7b42965ad69da9d4b95719a corporate/3.0/SRPMS/unzip-5.50-9.4.C30mdk.src.rpm

Corporate 3.0/X86_64:
ac91d1e086ad8aeb7c6bd1e8a67a2beb corporate/3.0/x86_64/unzip-5.50-9.4.C30mdk.x86_64.rpm
dafe241ea7b42965ad69da9d4b95719a corporate/3.0/SRPMS/unzip-5.50-9.4.C30mdk.src.rpm

Corporate 4.0:
6389250d173ed94a1736a1881247e29e corporate/4.0/i586/unzip-5.52-1.4.20060mlcs4.i586.rpm
589667d7f856c52f748fae21a76bed57 corporate/4.0/SRPMS/unzip-5.52-1.4.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
2d28c159cb0e827c84de9f79acfbfde6 corporate/4.0/x86_64/unzip-5.52-1.4.20060mlcs4.x86_64.rpm
589667d7f856c52f748fae21a76bed57 corporate/4.0/SRPMS/unzip-5.52-1.4.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
57b08ef4bc95454c51a06606c5b3ec2e mnf/2.0/i586/unzip-5.50-9.4.M20mdk.i586.rpm
a08d9ddf441401aa1967cd81b781e6cd mnf/2.0/SRPMS/unzip-5.50-9.4.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFH4EAlmqjQ0CJFipgRAjsfAJ0cIy+MQW/ARQmvODg70kOv2neK/gCdEFRj
M7cz0koPMBEkaShat50CIqc=
=BTId
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close