Ulf Härnhammar has discovered some vulnerabilities in unace, which can be exploited by malicious people to compromise a user's system.
1) An input validation error when extracting files compressed with ACE (.ace) makes it possible extract files to arbitrary locations outside the specified directory using the "../" directory traversal sequence or an absolute path.
The vulnerability has been confirmed in version 1.2b. Other versions may also be affected.
2) Some boundary errors in the processing of malicious ACE archives can be exploited to cause a buffer overflow by tricking a user into extracting, testing, or listing a specially crafted archive.
The vulnerabilities have been confirmed in version 1.2b. One of the buffer overflow vulnerabilities have also been reported in version 2.04, 2.2 and 2.5. Other versions may also be affected.
Successful exploitation may allow execution of arbitrary code.
Solution: Do not extract, list, or test untrusted ACE archives.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: unace Directory Traversal and Buffer Overflow Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.