Home / vulnerabilities MDVSA-2008-068.txt
Posted on 19 March 2008
Source : packetstormsecurity.org Link
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:068
http://www.mandriva.com/security/
_______________________________________________________________________
Package : unzip
Date : March 18, 2008
Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________
Problem Description:
Tavis Ormandy of Google Security discovered an invalid pointer flaw
in unzip that could lead to the execution of arbitrary code with the
privileges of the user running unzip.
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
8ab02d1ae7407c44cd1a1b9ec6c9cf61 2007.0/i586/unzip-5.52-3.1mdv2007.0.i586.rpm
57f5147c837b81e917a8d5651360e2cc 2007.0/SRPMS/unzip-5.52-3.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
b7e80efd92608ae0a78a984e34bb8eff 2007.0/x86_64/unzip-5.52-3.1mdv2007.0.x86_64.rpm
57f5147c837b81e917a8d5651360e2cc 2007.0/SRPMS/unzip-5.52-3.1mdv2007.0.src.rpm
Mandriva Linux 2007.1:
57dde2a4dc7f38ebcdff410b370f61f4 2007.1/i586/unzip-5.52-3.1mdv2007.1.i586.rpm
d8415ea1276040828fe1d413ee286563 2007.1/SRPMS/unzip-5.52-3.1mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
5cb9ca374ed552c88db439e6cb940e33 2007.1/x86_64/unzip-5.52-3.1mdv2007.1.x86_64.rpm
d8415ea1276040828fe1d413ee286563 2007.1/SRPMS/unzip-5.52-3.1mdv2007.1.src.rpm
Mandriva Linux 2008.0:
994efe8ccdbc3513e8095dd35065905c 2008.0/i586/unzip-5.52-3.1mdv2008.0.i586.rpm
166137b40bd05dcd93a014d9ce0bb34f 2008.0/SRPMS/unzip-5.52-3.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
38d80bbd775b4d190adc8c4b86cc77aa 2008.0/x86_64/unzip-5.52-3.1mdv2008.0.x86_64.rpm
166137b40bd05dcd93a014d9ce0bb34f 2008.0/SRPMS/unzip-5.52-3.1mdv2008.0.src.rpm
Corporate 3.0:
fc663b970f8876e8f83a8d93acf019c0 corporate/3.0/i586/unzip-5.50-9.4.C30mdk.i586.rpm
dafe241ea7b42965ad69da9d4b95719a corporate/3.0/SRPMS/unzip-5.50-9.4.C30mdk.src.rpm
Corporate 3.0/X86_64:
ac91d1e086ad8aeb7c6bd1e8a67a2beb corporate/3.0/x86_64/unzip-5.50-9.4.C30mdk.x86_64.rpm
dafe241ea7b42965ad69da9d4b95719a corporate/3.0/SRPMS/unzip-5.50-9.4.C30mdk.src.rpm
Corporate 4.0:
6389250d173ed94a1736a1881247e29e corporate/4.0/i586/unzip-5.52-1.4.20060mlcs4.i586.rpm
589667d7f856c52f748fae21a76bed57 corporate/4.0/SRPMS/unzip-5.52-1.4.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
2d28c159cb0e827c84de9f79acfbfde6 corporate/4.0/x86_64/unzip-5.52-1.4.20060mlcs4.x86_64.rpm
589667d7f856c52f748fae21a76bed57 corporate/4.0/SRPMS/unzip-5.52-1.4.20060mlcs4.src.rpm
Multi Network Firewall 2.0:
57b08ef4bc95454c51a06606c5b3ec2e mnf/2.0/i586/unzip-5.50-9.4.M20mdk.i586.rpm
a08d9ddf441401aa1967cd81b781e6cd mnf/2.0/SRPMS/unzip-5.50-9.4.M20mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)
iD8DBQFH4EAlmqjQ0CJFipgRAjsfAJ0cIy+MQW/ARQmvODg70kOv2neK/gCdEFRj
M7cz0koPMBEkaShat50CIqc=
=BTId
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/