what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-068

Mandriva Linux Security Advisory 2008-068
Posted Mar 19, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Tavis Ormandy of Google Security discovered an invalid pointer flaw in unzip that could lead to the execution of arbitrary code with the privileges of the user running unzip.

tags | advisory, arbitrary
systems | linux, mandriva
advisories | CVE-2008-0888
SHA-256 | 6241bf31366b86f9214c0b04b8389979ede508c055d9251b1a4119710eb80ccc

Mandriva Linux Security Advisory 2008-068

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:068
https://www.mandriva.com/security/
_______________________________________________________________________

Package : unzip
Date : March 18, 2008
Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

Tavis Ormandy of Google Security discovered an invalid pointer flaw
in unzip that could lead to the execution of arbitrary code with the
privileges of the user running unzip.

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
8ab02d1ae7407c44cd1a1b9ec6c9cf61 2007.0/i586/unzip-5.52-3.1mdv2007.0.i586.rpm
57f5147c837b81e917a8d5651360e2cc 2007.0/SRPMS/unzip-5.52-3.1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
b7e80efd92608ae0a78a984e34bb8eff 2007.0/x86_64/unzip-5.52-3.1mdv2007.0.x86_64.rpm
57f5147c837b81e917a8d5651360e2cc 2007.0/SRPMS/unzip-5.52-3.1mdv2007.0.src.rpm

Mandriva Linux 2007.1:
57dde2a4dc7f38ebcdff410b370f61f4 2007.1/i586/unzip-5.52-3.1mdv2007.1.i586.rpm
d8415ea1276040828fe1d413ee286563 2007.1/SRPMS/unzip-5.52-3.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
5cb9ca374ed552c88db439e6cb940e33 2007.1/x86_64/unzip-5.52-3.1mdv2007.1.x86_64.rpm
d8415ea1276040828fe1d413ee286563 2007.1/SRPMS/unzip-5.52-3.1mdv2007.1.src.rpm

Mandriva Linux 2008.0:
994efe8ccdbc3513e8095dd35065905c 2008.0/i586/unzip-5.52-3.1mdv2008.0.i586.rpm
166137b40bd05dcd93a014d9ce0bb34f 2008.0/SRPMS/unzip-5.52-3.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
38d80bbd775b4d190adc8c4b86cc77aa 2008.0/x86_64/unzip-5.52-3.1mdv2008.0.x86_64.rpm
166137b40bd05dcd93a014d9ce0bb34f 2008.0/SRPMS/unzip-5.52-3.1mdv2008.0.src.rpm

Corporate 3.0:
fc663b970f8876e8f83a8d93acf019c0 corporate/3.0/i586/unzip-5.50-9.4.C30mdk.i586.rpm
dafe241ea7b42965ad69da9d4b95719a corporate/3.0/SRPMS/unzip-5.50-9.4.C30mdk.src.rpm

Corporate 3.0/X86_64:
ac91d1e086ad8aeb7c6bd1e8a67a2beb corporate/3.0/x86_64/unzip-5.50-9.4.C30mdk.x86_64.rpm
dafe241ea7b42965ad69da9d4b95719a corporate/3.0/SRPMS/unzip-5.50-9.4.C30mdk.src.rpm

Corporate 4.0:
6389250d173ed94a1736a1881247e29e corporate/4.0/i586/unzip-5.52-1.4.20060mlcs4.i586.rpm
589667d7f856c52f748fae21a76bed57 corporate/4.0/SRPMS/unzip-5.52-1.4.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
2d28c159cb0e827c84de9f79acfbfde6 corporate/4.0/x86_64/unzip-5.52-1.4.20060mlcs4.x86_64.rpm
589667d7f856c52f748fae21a76bed57 corporate/4.0/SRPMS/unzip-5.52-1.4.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
57b08ef4bc95454c51a06606c5b3ec2e mnf/2.0/i586/unzip-5.50-9.4.M20mdk.i586.rpm
a08d9ddf441401aa1967cd81b781e6cd mnf/2.0/SRPMS/unzip-5.50-9.4.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

https://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFH4EAlmqjQ0CJFipgRAjsfAJ0cIy+MQW/ARQmvODg70kOv2neK/gCdEFRj
M7cz0koPMBEkaShat50CIqc=
=BTId
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close