First published: Thu May 20 2010(Updated: )
Dan Rosenberg reported a directory traversal flaw in fastjar that allows an attacker, who is able to convince a victim to extract a malicious .jar file, to overwrite arbitrary files on disk without prompting the victim. The files to be overwritten must be writable by the user extracting the .jar file. This issue has been assigned the name <a href="https://access.redhat.com/security/cve/CVE-2010-0831">CVE-2010-0831</a>, and it is possible that it is due to an incomplete fix for <a href="https://access.redhat.com/security/cve/CVE-2006-3619">CVE-2006-3619</a> (<a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2006-3619 Directory traversal issue in fastjar" href="show_bug.cgi?id=198912">bug #198912</a>). Upon investigation, the same problem exists in the jar archiver as provided by OpenJDK and java-1.4.2-gcj-compat.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fastjar | ||
OpenJDK 8 | ||
Unknown java-1.4.2-gcj-compat |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-594497 has a high severity rating due to the potential for arbitrary file overwriting without user consent.
To fix REDHAT-BUG-594497, update the fastjar and OpenJDK packages to their latest versions where the vulnerability is patched.
Systems running Red Hat fastjar and Oracle OpenJDK are affected by REDHAT-BUG-594497.
REDHAT-BUG-594497 is a directory traversal vulnerability that allows file overwriting.
The directory traversal flaw in fastjar was reported by Dan Rosenberg.