TITLE: SpeedProject Products ZIP and JAR Directory Traversal SECUNIA ADVISORY ID: SA19006 VERIFY ADVISORY: http://secunia.com/advisories/19006/ CRITICAL: Less critical IMPACT: System access WHERE: >From remote SOFTWARE: Speedproject SpeedCommander 11.x http://secunia.com/product/6186/ Speedproject Squeez 5.x http://secunia.com/product/6184/ Speedproject ZipStar 5.x http://secunia.com/product/6187/ DESCRIPTION: Hamid Ebadi has reported a vulnerability in various SpeedProject products, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an input validation error when extracting files compressed with ZIP (.zip) or JAR (.jar). This makes it possible to have files extracted to arbitrary locations outside the specified directory using the "../" directory traversal sequence. Successful exploitation requires that the "Create Directories" option is enabled (default). The vulnerability has been reported in the following products. Other versions may also be affected. * SpeedCommander 11.01 Build 4450 * ZipStar 5.10 * Squeez 5.10 SOLUTION: Do not extract untrusted ZIP and JAR files. Never extract files as an administrative user. ORIGINAL ADVISORY: http://hamid.ir/security/speedproject.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------