Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 5 Jan 2015 12:08:39 -0500 (EST)
From: "Steven M. Christey" <>
To: Salvatore Bonaccorso <>
cc: OSS Security Mailinglist <>,
        CVE Assignments MITRE <>,
        Jakub Wilk <>
Subject: Re: CVE Request: arj: symlink directory traversal and directory
 traversal via //multiple/leading/slash

On Sat, 3 Jan 2015, Salvatore Bonaccorso wrote:

> arj: symlink directory traversal:
> -

Use CVE-2015-0556.

> arj: directory traversal via //multiple/leading/slash:
> -

Use CVE-2015-0557.

> Reproducers for both issues are also attached bot the corresponding
> bugs.
> Could you assign CVE(s) for these isues? (Are two ore one appropriate?
> It is the same reporter and similar kind of issue).

Two CVEs are used here.

While the bugs have the same technical impact - accessing files outside of 
an intended directory - the root causes and vulnerability types are 
different.  774434 does not handle when symlink destinations point outside 
the directory.  774435 is a protection mechanism failure in which an 
attempt is made to protect against directory traversal by removing a 
leading slash, but not considering that there can be multiple leading 


CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.