Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 5 Jan 2015 12:08:39 -0500 (EST)
From: "Steven M. Christey" <coley@...re.org>
To: Salvatore Bonaccorso <carnil@...ian.org>
cc: OSS Security Mailinglist <oss-security@...ts.openwall.com>,
        CVE Assignments MITRE <cve-assign@...re.org>,
        Jakub Wilk <jwilk@...ian.org>
Subject: Re: CVE Request: arj: symlink directory traversal and directory
 traversal via //multiple/leading/slash


On Sat, 3 Jan 2015, Salvatore Bonaccorso wrote:

> arj: symlink directory traversal:
> - https://bugs.debian.org/774434

Use CVE-2015-0556.

> arj: directory traversal via //multiple/leading/slash:
> - https://bugs.debian.org/774435

Use CVE-2015-0557.

> Reproducers for both issues are also attached bot the corresponding
> bugs.
>
> Could you assign CVE(s) for these isues? (Are two ore one appropriate?
> It is the same reporter and similar kind of issue).

Two CVEs are used here.

While the bugs have the same technical impact - accessing files outside of 
an intended directory - the root causes and vulnerability types are 
different.  774434 does not handle when symlink destinations point outside 
the directory.  774435 is a protection mechanism failure in which an 
attempt is made to protect against directory traversal by removing a 
leading slash, but not considering that there can be multiple leading 
slashes.

---

CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ