Your message dated Tue, 19 Sep 2006 09:17:09 +0200
with message-id <[EMAIL PROTECTED]>
and subject line not a vulnerability in php
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: php-pear
Severity: important
Tags: security
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
CVE-2006-0931: "Directory traversal vulnerability in PEAR::Archive_Tar
1.2 allows remote attackers to create and overwrite arbitrary files via
certain crafted pathnames in a TAR archive."
This is PEAR bug 6933 [1] and appears unfixed upstream; the bug is open
and there has not been a new release in 2006. I presume that Debian's
version is affected, but have not tested. Unfortunately, the advisory
[2] does not include steps to reproduce, but rather has a vague link to
a utility to create sample malicious archives.
sarge and woody's php4-pear also contain PEAR::Archive_Tar.
Please include the CVE in your changelog.
Thanks,
Alec
[1] http://pear.php.net/bugs/bug.php?id=6933
[2] http://www.hamid.ir/security/phptar.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFEcjxyAud/2YgchcQRAoL8AJ9l4zPHnlbuKk7pO2of3166koYnEACgltp0
pXpzZX1K7xsn2njzqsasPRo=
=ZYKt
-----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
hi alec,
examining this CVE report further, and discussing it with the security
team, the consensus is that this is not a vulnerability in php. the
attack vector is a just-so-slightly refactored input-sanitizing attack.
it is the responsibility of the application in question to ensure that
it does not do anything it shouldn't with the tarfiles in question, not
the php engine's.
however, if there are packages in debian using Archive::Tar, they should
certainly be inspected for this kind of vulnerability.
thanks,
sean
signature.asc
Description: This is a digitally signed message part
--- End Message ---