First published: Fri Jan 02 2015(Updated: )
Open-source ARJ archiver 3.10.22 allows remote attackers to conduct directory traversal attacks via a symlink attack in an ARJ archive.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/arj | <=3.10.22-9<=3.10.22-10<=3.10.22-12 | 3.10.22-13 3.10.22-10+deb7u1 3.10.22-9+deb6u1 |
debian/arj | 3.10.22-24 3.10.22-26 3.10.22-27 | |
ARJ Archiver | <=3.10.22 | |
Fedora | =20 | |
Fedora | =21 | |
Fedora | =22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0556 has a medium severity rating due to its potential for directory traversal attacks.
To fix CVE-2015-0556, update to a patched version of the ARJ archiver that is 3.10.22-24 or newer.
CVE-2015-0556 affects the ARJ archiver versions up to 3.10.22 and the Fedora operating system versions 20 to 22.
Yes, CVE-2015-0556 can be exploited remotely through crafted ARJ archives containing symlink attacks.
The maintainer of the ARJ archiver, particularly on Debian and Fedora platforms, is responsible for addressing CVE-2015-0556.