First published: Mon Aug 02 2010(Updated: )
An integer wrap-around flaw has been reported in the way cabextract processed certain Cabinet (*.cab) archive files. If a local user was tricked into opening a specially-crafted *.cab archive in test archive mode, it could lead to cabextract executable crash. References: [1] <a href="http://bugs.gentoo.org/show_bug.cgi?id=329891">http://bugs.gentoo.org/show_bug.cgi?id=329891</a> Upstream patches: [2] <a href="http://libmspack.svn.sourceforge.net/viewvc/libmspack/libmspack/trunk/mspack/qtmd.c?r1=114&r2=113">http://libmspack.svn.sourceforge.net/viewvc/libmspack/libmspack/trunk/mspack/qtmd.c?r1=114&r2=113</a> [3] <a href="http://libmspack.svn.sourceforge.net/viewvc/libmspack?view=revision&revision=118">http://libmspack.svn.sourceforge.net/viewvc/libmspack?view=revision&revision=118</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cabextract | <=1.2 | |
Cabextract | =0.1 | |
Cabextract | =0.2 | |
Cabextract | =0.3 | |
Cabextract | =0.4 | |
Cabextract | =0.5 | |
Cabextract | =0.6 | |
Cabextract | =1.0 | |
Cabextract | =1.1 |
http://libmspack.svn.sourceforge.net/viewvc/libmspack/libmspack/trunk/mspack/qtmd.c?r1=114&r2=113
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2801 is classified as a moderate severity vulnerability due to the potential for application crashes.
To mitigate CVE-2010-2801, users should upgrade to a version of cabextract later than 1.2.
CVE-2010-2801 is caused by an integer wrap-around flaw when processing certain specially-crafted Cabinet archive files.
CVE-2010-2801 affects users of cabextract versions 0.1 to 1.2.
An attacker could use CVE-2010-2801 to craft a malicious cabinet file that, when opened, results in a crash of the cabextract executable.