Skip to navigation

Security Advisory lha security update

Advisory: RHSA-2004:323-09
Type: Security Advisory
Severity: Important
Issued on: 2004-09-01
Last updated on: 2004-09-01
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2004-0694
CVE-2004-0745
CVE-2004-0769
CVE-2004-0771

Details

An updated lha package that fixes a buffer overflow is now available.

LHA is an archiving and compression utility for LHarc format archives.

Lukasz Wojtow discovered a stack-based buffer overflow in all versions
of lha up to and including version 1.14. A carefully created archive could
allow an attacker to execute arbitrary code when a victim extracts or tests
the archive. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0769 to this issue.

Buffer overflows were discovered in the command line processing of all
versions of lha up to and including version 1.14. If a malicious user
could trick a victim into passing a specially crafted command line to the
lha command, it is possible that arbitrary code could be executed. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the names CAN-2004-0771 and CAN-2004-0694 to these issues.

Thomas Biege discovered a shell meta character command execution
vulnerability in all versions of lha up to and including 1.14. An attacker
could create a directory with shell meta characters in its name which could
lead to arbitrary command execution. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0745 to
this issue.

Users of lha should update to this updated package which contains
backported patches and is not vulnerable to these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/SRPMS/lha-1.14i-10.4.src.rpm
Missing file
    MD5: 494aaceeb0afa3c661c6eb0981af1fd2
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/i386/lha-1.14i-10.4.i386.rpm
Missing file
    MD5: 1d4d09649c91c742be78422fa746d93a
 
x86_64:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/x86_64/lha-1.14i-10.4.x86_64.rpm
Missing file
    MD5: 36bb4dbf784b15b7355548582f42a009
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/SRPMS/lha-1.14i-10.4.src.rpm
Missing file
    MD5: 494aaceeb0afa3c661c6eb0981af1fd2
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/i386/lha-1.14i-10.4.i386.rpm
Missing file
    MD5: 1d4d09649c91c742be78422fa746d93a
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/ia64/lha-1.14i-10.4.ia64.rpm
Missing file
    MD5: 3d6b75954662f94459e0025599a4b7b8
 
PPC:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/ppc/lha-1.14i-10.4.ppc.rpm
Missing file
    MD5: 63a3f6ee8c97484d8c0f95423adcb74f
 
s390:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/s390/lha-1.14i-10.4.s390.rpm
Missing file
    MD5: 41c9148155410c09c6898cd971a873f8
 
s390x:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/s390x/lha-1.14i-10.4.s390x.rpm
Missing file
    MD5: 2a2cd9f9ece25a0d885fb5079c608d6f
 
x86_64:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/x86_64/lha-1.14i-10.4.x86_64.rpm
Missing file
    MD5: 36bb4dbf784b15b7355548582f42a009
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/SRPMS/lha-1.14i-10.4.src.rpm
Missing file
    MD5: 494aaceeb0afa3c661c6eb0981af1fd2
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/i386/lha-1.14i-10.4.i386.rpm
Missing file
    MD5: 1d4d09649c91c742be78422fa746d93a
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/ia64/lha-1.14i-10.4.ia64.rpm
Missing file
    MD5: 3d6b75954662f94459e0025599a4b7b8
 
x86_64:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/x86_64/lha-1.14i-10.4.x86_64.rpm
Missing file
    MD5: 36bb4dbf784b15b7355548582f42a009
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/SRPMS/lha-1.14i-10.4.src.rpm
Missing file
    MD5: 494aaceeb0afa3c661c6eb0981af1fd2
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/i386/lha-1.14i-10.4.i386.rpm
Missing file
    MD5: 1d4d09649c91c742be78422fa746d93a
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/ia64/lha-1.14i-10.4.ia64.rpm
Missing file
    MD5: 3d6b75954662f94459e0025599a4b7b8
 
x86_64:
ftp://updates.redhat.com/rhn/repository/NULL/lha/1.14i-10.4/x86_64/lha-1.14i-10.4.x86_64.rpm
Missing file
    MD5: 36bb4dbf784b15b7355548582f42a009
 

Bugs fixed (see bugzilla for more information)

126740 - Buffer overflow in lha


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/