First published: Mon Jan 05 2015(Updated: )
It was reported [1] that p7zip suffers from a directory traversal flaw. This could for the overwriting of arbitrary files through uncompressing a crafted archive, with the privileges of the user running 7z. For example: $ ln -s /tmp foo $ 7z a test.7z foo $ rm foo $ mkdir foo $ echo hello > foo/test $ 7z a test.7z foo/test $ rm -rf foo $ 7z x test.7z This will create 'foo' as a symlink to /tmp which will in turn contain the file 'test' with the privileges of the user unarchiving 'test.7z'. [1] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774660">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774660</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/p7zip | <=9.04~dfsg.1-1<=9.20.1~dfsg.1-4 | 9.20.1~dfsg.1-4.2 9.04~dfsg.1-1+deb6u1 9.20.1~dfsg.1-4.1+deb8u1 9.20.1~dfsg.1-4+deb7u1 |
debian/p7zip | 16.02+dfsg-8 16.02+transitional.1 | |
Fedora | =22 | |
Fedora | =23 | |
Oracle Solaris SPARC | =10.0 | |
Oracle Solaris SPARC | =11.2 | |
7-Zip | =9.20.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1038 has a medium severity rating due to its potential for directory traversal flaws that could lead to file overwriting.
To fix CVE-2015-1038, upgrade the p7zip package to versions higher than 9.20.1~dfsg.1-4 or apply relevant security patches.
CVE-2015-1038 affects p7zip versions up to and including 9.20.1~dfsg.1-4.
CVE-2015-1038 impacts multiple platforms including Debian, Fedora, and Oracle Solaris.
CVE-2015-1038 is not considered a remote exploit, as it requires user interaction to uncompress a crafted archive.