Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 5 Jan 2015 12:08:39 -0500 (EST)
From: "Steven M. Christey" <>
To: Salvatore Bonaccorso <>
cc: OSS Security Mailinglist <>,
        CVE Assignments MITRE <>,
        Jakub Wilk <>
Subject: Re: CVE Request: arj: symlink directory traversal and directory
 traversal via //multiple/leading/slash

On Sat, 3 Jan 2015, Salvatore Bonaccorso wrote:

> arj: symlink directory traversal:
> -

Use CVE-2015-0556.

> arj: directory traversal via //multiple/leading/slash:
> -

Use CVE-2015-0557.

> Reproducers for both issues are also attached bot the corresponding
> bugs.
> Could you assign CVE(s) for these isues? (Are two ore one appropriate?
> It is the same reporter and similar kind of issue).

Two CVEs are used here.

While the bugs have the same technical impact - accessing files outside of 
an intended directory - the root causes and vulnerability types are 
different.  774434 does not handle when symlink destinations point outside 
the directory.  774435 is a protection mechanism failure in which an 
attempt is made to protect against directory traversal by removing a 
leading slash, but not considering that there can be multiple leading 


CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ