MEDIUM · 5.0

CVE-2004-1027

Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote attackers to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequ...

Vulnerability Description

Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote attackers to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequences.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
ArjsoftwareUnarj2.62
GentooLinuxAll versions
DebianDebian Linux3.0

References

FAQ

What is CVE-2004-1027?

CVE-2004-1027 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote attackers to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequ...

How severe is CVE-2004-1027?

CVE-2004-1027 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2004-1027?

Check the references section above for vendor advisories and patch information. Affected products include: Arjsoftware Unarj, Gentoo Linux, Debian Debian Linux.