Red Hat: lha security vulnerability
Summary
Summary
LHA is an archiving and compression utility for LHarc format archives.Lukasz Wojtow discovered a stack-based buffer overflow in all versionsof lha up to and including version 1.14. A carefully created archive couldallow an attacker to execute arbitrary code when a victim extracts or teststhe archive. The Common Vulnerabilities and Exposures project(cve.mitre.org) has assigned the name CAN-2004-0769 to this issue.Buffer overflows were discovered in the command line processing of allversions of lha up to and including version 1.14. If a malicious user cantrick a victim into passing a specially crafted command line to the lhacommand, it is possible that arbitrary code could be executed. The CommonVulnerabilities and Exposures project (cve.mitre.org) has assigned thenames CAN-2004-0771 and CAN-2004-0694 to these issues.Thomas Biege discovered a shell meta character command executionvulnerability in all versions of lha up to and including 1.14. An attackercould create a directory with shell meta characters in its name which couldlead to arbitrary command execution. The Common Vulnerabilities andExposures project (cve.mitre.org) has assigned the name CAN-2004-0745 tothis issue.Users of lha should update to this updated package which containsbackported patches and is not vulnerable to these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
126740 - Buffer overflow in lha
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
b1b6d9d7d549331766f710ba6c5bf494 lha-1.00-17.3.src.rpm
i386:
3247304974c5a1ee592a1095a3a8c265 lha-1.00-17.3.i386.rpm
ia64:
1d13c396eab707b0603464455b4065e0 lha-1.00-17.3.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
b1b6d9d7d549331766f710ba6c5bf494 lha-1.00-17.3.src.rpm
ia64:
1d13c396eab707b0603464455b4065e0 lha-1.00-17.3.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
b1b6d9d7d549331766f710ba6c5bf494 lha-1.00-17.3.src.rpm
i386:
3247304974c5a1ee592a1095a3a8c265 lha-1.00-17.3.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
b1b6d9d7d549331766f710ba6c5bf494 lha-1.00-17.3.src.rpm
i386:
3247304974c5a1ee592a1095a3a8c265 lha-1.00-17.3.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
References
http://marc.theaimsgroup.com/?l=bugtraq&m=108668791510153 CVE -CVE-2004-0771 CVE -CVE-2004-0769 CVE -CVE-2004-0694 CVE -CVE-2004-0745
Package List
Topic
An updated lha package that fixes a buffer overflow is now available.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Bugs Fixed