blob: 5d92272850d1f5c0d3d719d7e4df341519b6c2d6 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200611-24">
<title>LHa: Multiple vulnerabilities</title>
LHa is affected by several vulnerabilities including the remote execution
of arbitrary code.
<product type="ebuild">lha</product>
<announced>November 28, 2006</announced>
<revised>November 28, 2006: 01</revised>
<package name="app-arch/lha" auto="yes" arch="*">
<unaffected range="ge">114i-r6</unaffected>
<vulnerable range="lt">114i-r6</vulnerable>
LHa is a console-based program for packing and unpacking LHarc
Tavis Ormandy of the Google Security Team discovered several
vulnerabilities in the LZH decompression component used by LHa. The
make_table function of unlzh.c contains an array index error and a
buffer overflow vulnerability. The build_tree function of unpack.c
contains a buffer underflow vulnerability. Additionally, unlzh.c
contains a code that could run in an infinite loop.
<impact type="normal">
By enticing a user to uncompress a specially crafted archive, a remote
attacker could cause a Denial of Service by CPU consumption or execute
arbitrary code with the rights of the user running the application.
There is no known workaround at this time.
All LHa users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-arch/lha-114i-r6&quot;</code>
<uri link="">CVE-2006-4335</uri>
<uri link="">CVE-2006-4336</uri>
<uri link="">CVE-2006-4337</uri>
<uri link="">CVE-2006-4338</uri>
<metadata tag="requester" timestamp="Fri, 24 Nov 2006 21:52:23 +0000">
<metadata tag="submitter" timestamp="Mon, 27 Nov 2006 17:02:28 +0000">
<metadata tag="bugReady" timestamp="Mon, 27 Nov 2006 17:07:24 +0000">