blob: 002d2f2e403871aacba88f54a9588a03f4e266e6 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200806-05">
<title>cbrPager: User-assisted execution of arbitrary code</title>
Insecure filename usage in cbrPager may allow for the remote execution of
arbitrary code.
<product type="ebuild">cbrpager</product>
<announced>June 16, 2008</announced>
<revised>June 16, 2008: 01</revised>
<package name="app-misc/cbrpager" auto="yes" arch="*">
<unaffected range="ge">0.9.17</unaffected>
<vulnerable range="lt">0.9.17</vulnerable>
cbrPager is a comic book pager.
Mamoru Tasaka discovered that filenames of the image archives are not
properly sanitized before being passed to decompression utilities like
unrar and unzip, which use the system() libc library call.
<impact type="normal">
A remote attacker could entice a user to open an archive with a
specially crafted filename, resulting in arbitrary code execution with
the privileges of the user running the application.
There is no known workaround at this time.
All cbrPager users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-misc/cbrpager-0.9.17&quot;</code>
<uri link="">CVE-2008-2575</uri>
<metadata tag="requester" timestamp="Wed, 28 May 2008 17:48:23 +0000">
<metadata tag="bugReady" timestamp="Tue, 03 Jun 2008 15:18:59 +0000">
<metadata tag="submitter" timestamp="Sat, 14 Jun 2008 21:12:52 +0000">