First published: Fri Jan 02 2015(Updated: )
Open-source ARJ archiver 3.10.22 does not properly remove leading slashes from paths, which allows remote attackers to conduct absolute path traversal attacks and write to arbitrary files via multiple leading slashes in a path in an ARJ archive.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/arj | <=3.10.22-9<=3.10.22-10<=3.10.22-12 | 3.10.22-13 3.10.22-10+deb7u1 3.10.22-9+deb6u1 |
debian/arj | 3.10.22-24 3.10.22-26 3.10.22-27 | |
ARJ Archiver | <=3.10.22 | |
Fedora | =20 | |
Fedora | =21 | |
Fedora | =22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0557 is classified as a high-severity vulnerability due to its potential for absolute path traversal attacks.
To mitigate CVE-2015-0557, users should update their ARJ archiver to version 3.10.22-24 or later.
CVE-2015-0557 affects the ARJ archiver versions up to and including 3.10.22 on various Debian and Fedora installations.
CVE-2015-0557 allows remote attackers to conduct absolute path traversal attacks, giving them the ability to write to arbitrary files.
Yes, CVE-2015-0557 remains a concern for users who have not upgraded to the patched versions of the ARJ archiver.