First published: Mon Aug 02 2010(Updated: )
An integer wrap-around flaw has been reported in the way cabextract processed certain Cabinet (*.cab) archive files. If a local user was tricked into opening a specially-crafted *.cab archive in test archive mode, it could lead to cabextract executable crash. References: [1] <a href="http://bugs.gentoo.org/show_bug.cgi?id=329891">http://bugs.gentoo.org/show_bug.cgi?id=329891</a> Upstream patches: [2] <a href="http://libmspack.svn.sourceforge.net/viewvc/libmspack/libmspack/trunk/mspack/qtmd.c?r1=114&r2=113">http://libmspack.svn.sourceforge.net/viewvc/libmspack/libmspack/trunk/mspack/qtmd.c?r1=114&r2=113</a> [3] <a href="http://libmspack.svn.sourceforge.net/viewvc/libmspack?view=revision&revision=118">http://libmspack.svn.sourceforge.net/viewvc/libmspack?view=revision&revision=118</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
cabextract and libmspack | <=1.2 | |
cabextract and libmspack | =0.1 | |
cabextract and libmspack | =0.2 | |
cabextract and libmspack | =0.3 | |
cabextract and libmspack | =0.4 | |
cabextract and libmspack | =0.5 | |
cabextract and libmspack | =0.6 | |
cabextract and libmspack | =1.0 | |
cabextract and libmspack | =1.1 |
http://libmspack.svn.sourceforge.net/viewvc/libmspack/libmspack/trunk/mspack/qtmd.c?r1=114&r2=113
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.