
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.2637 ark security update 3 August 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ark Publisher: Debian Operating System: Debian GNU/Linux 10 UNIX variants (UNIX, Linux, OSX) Impact/Access: Create Arbitrary Files -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2020-16116 Original Bulletin: http://www.debian.org/security/2020/dsa-4738 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running ark check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-4738-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff July 31, 2020 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : ark CVE ID : CVE-2020-16116 Dominik Penner discovered that the Ark archive manager did not sanitise extraction paths, which could result in maliciously crafted archives writing outside the extraction directory. For the stable distribution (buster), this problem has been fixed in version 4:18.08.3-1+deb10u1. We recommend that you upgrade your ark packages. For the detailed security status of ark please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ark Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl8kezEACgkQEMKTtsN8 Tjac2xAAjFNOIJ2x50gZIi+w26DnBnPexTFQT2auKzWMD1jp/HNdjaX7TTDUJMAr nvNWAKgLoSvcRcMsKSJWXAM0rgALHwuqjBNjhnil9kCZ+AFA+NrswP302JBwznyM kZ4FEtc0eKC12cGgLBQobvL7b1jmR5pYCZxkNy7UCvEsuCys+YaO1vdZzdYWdwS6 YBh4fyvbKJHcIBc08JJvmd+M9E9tHo3sQ9WAEJUVR7awlQbtZPb2olEwZKiuAGwM qeDcvwHaW2OOQz5wpvzv594kPoLI8JQWus9kJZ8HU/qioZ+X0YZS5VNWwYjpS3/n 03ZN/3NGw/B2CW2B81vxzxpGowAgxmEt2YiZwWW9UMhJGNNC3S3yijCOp4UzrTrA Q7ibdvmxutZi4xpJVYoqwSif4yScWwPZFLpyD11wPBbUGBrCMDaSQlnQV7pUJRBK yLjfDvZTs6VXt9U8hkn7P2h0sCsTlm/j7iBGs9Z8eRNdDZNZ2/1YEEkrutwYwoxH VTe1A+9YjUUXZ5XmYJoj99gfvFOM3dFL1amuRXow7BfLIv9AJgCpb0CnR3hmPaM6 sbV8eoAB8Zuy1NCfuYCc3xIC5i56k6yBMHXD66T6oHA1pCW1fCRi/0MkBvh37ZWf 3rAB6EjF0bZ4GRPNjMRrzQKJghjlDYqr8tnCx61fLLF3AWt6GYM= =LSjb - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXydw5eNLKJtyKPYoAQiSLQ/5AXFnpebWQwatzKoJ/8c+fdhtWtiS+ziR otYgwUyKE6H/dKmrqhpQqISixQEAD9xWdNcIauAqFOKaHJvBHze7wU6gMb6Kc6kY b3hf12mdwWpMWXP/bBz0ihu5kWJYtq2ssCWpfiLFBIyNgH4w8EqT+YxsdjRwB7bD qWPcoVgobVa593Ar6eDV/mx8Ut8W0DTndFmVPg1D5zi2ZbQThSLb6jaGK9Eabze9 yKFUkicIAsg/cX/vVuwgKf1RFfRKQi4le1X/AcBINGM593WXvUQQ/sqI2OZeKtmi DsbPt29+4En+3XY+ecMxuAAAijzU8zNOaNmLLLIOL1JXDQvtKM8P/Ac0PEj7/fUr BQPfX9ORzLBkiFgR3YrjFAx7AHbrmQmj2iYTVZxuWE6y/L06CVOo6T9rqTT8178+ FIduVkui2OZvoWgRikas15nRQeUQpj72GF30UN1MDeA/Ct743RqgD0aZ3scYoXI2 fz4kK/lKT1SfP0ZLtrSQW7q3cuFb396iq30ftYm7ryLzLFiZ+DstVVWikIo5LdYq TxNIK3qGROT8B8FBpB7SrUh2AHMb3qYGF5JdwWYpYYPBSL3rFmi3OCT9Wo3nD1MP PK7lH3pybrmmdnlXgF1vpk2dRdIhYTLQ5PS47RsjC64kSkB4I0lFH3MWY6DNQMfe D9yvlhuBRBY= =fybl -----END PGP SIGNATURE-----
https://www.malwaredevil.com/2020/08/03/esb-2020-2637-unix-linuxdebian-ark-create-arbitrary-files-remote-with-user-interaction/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2637-unix-linuxdebian-ark-create-arbitrary-files-remote-with-user-interaction
No comments:
Post a Comment