You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa plexus-archiver

Sigurnosni nedostatak programskog paketa plexus-archiver

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2018-6c55e1f79c
2018-06-14 18:14:18.568902
——————————————————————————–

Name : plexus-archiver
Product : Fedora 27
Version : 3.4
Release : 4.fc27
URL : http://codehaus-plexus.github.io/plexus-archiver
Summary : Plexus Archiver Component
Description :
The Plexus project seeks to create end-to-end developer tools for
writing applications. At the core is the container, which can be
embedded or for a full scale application server. There are many
reusable components for hibernate, form processing, jndi, i18n,
velocity, etc. Plexus also includes an application server which
is like a J2EE application server, without all the baggage.

——————————————————————————–
Update Information:

Security fix: arbitrary file write vulnerability / arbitrary code execution
using a specially crafted zip file (CVE-2018-1002200) A path traversal
vulnerability has been discovered in plexus-archiver when extracting a carefully
crafted zip file which holds path traversal file names. A remote attacker could
use this vulnerability to write files outside the target directory and overwrite
existing files with malicious code or vulnerable configurations. Red Hat would
like to thank Danny Grander (Snyk) for reporting this issue. External
References: https://snyk.io/research/zip-slip-vulnerability
——————————————————————————–
ChangeLog:

* Fri Jun 1 2018 Mikolaj Izdebski <mizdebsk@redhat.com> – 0:3.4-4
– Fix arbitrary file write vulnerability
– Resolves: CVE-2018-1002200
——————————————————————————–
References:

[ 1 ] Bug #1584392 – CVE-2018-1002200 plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file
https://bugzilla.redhat.com/show_bug.cgi?id=1584392
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-6c55e1f79c’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7XAAUCTHL2PDJHW5Q2IYATOAXX4AFFU/

——————————————————————————–
Fedora Update Notification
FEDORA-2018-7a9a2f6ec0
2018-06-14 19:12:51.961401
——————————————————————————–

Name : plexus-archiver
Product : Fedora 28
Version : 3.5
Release : 6.fc28
URL : http://codehaus-plexus.github.io/plexus-archiver
Summary : Plexus Archiver Component
Description :
The Plexus project seeks to create end-to-end developer tools for
writing applications. At the core is the container, which can be
embedded or for a full scale application server. There are many
reusable components for hibernate, form processing, jndi, i18n,
velocity, etc. Plexus also includes an application server which
is like a J2EE application server, without all the baggage.

——————————————————————————–
Update Information:

Security fix: arbitrary file write vulnerability / arbitrary code execution
using a specially crafted zip file (CVE-2018-1002200) A path traversal
vulnerability has been discovered in plexus-archiver when extracting a carefully
crafted zip file which holds path traversal file names. A remote attacker could
use this vulnerability to write files outside the target directory and overwrite
existing files with malicious code or vulnerable configurations. Red Hat would
like to thank Danny Grander (Snyk) for reporting this issue. External
References: https://snyk.io/research/zip-slip-vulnerability
——————————————————————————–
ChangeLog:

* Fri Jun 1 2018 Mikolaj Izdebski <mizdebsk@redhat.com> – 0:3.5-6
– Fix arbitrary file write vulnerability
– Resolves: CVE-2018-1002200
——————————————————————————–
References:

[ 1 ] Bug #1584392 – CVE-2018-1002200 plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file
https://bugzilla.redhat.com/show_bug.cgi?id=1584392
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-7a9a2f6ec0’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GZQQJQ2AQA6TR7BYV4DBSHZ3DE7ADWM3/

AutorAndrej Sefic
Cert idNCERT-REF-2018-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa ruby

Otkriveni su sigurnosni nedostaci u programskom paketu ruby za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju pristup osjetljivim informacijama,...

Close