ackle       14/05/19 00:41:58

  Modified:             glsa-200502-32.xml
  Log:
  GLSA 200502-32, Revised for UnAce 2.5-r3, bug 81958

Revision  Changes    Path
1.2                  xml/htdocs/security/en/glsa/glsa-200502-32.xml

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-200502-32.xml?rev=1.2&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-200502-32.xml?rev=1.2&content-type=text/plain
diff : 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-200502-32.xml?r1=1.1&r2=1.2

Index: glsa-200502-32.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/security/en/glsa/glsa-200502-32.xml,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- glsa-200502-32.xml  28 Feb 2005 16:37:31 -0000      1.1
+++ glsa-200502-32.xml  19 May 2014 00:41:58 -0000      1.2
@@ -1,73 +1,62 @@
-<?xml version="1.0" encoding="utf-8"?>
+<?xml version="1.0" encoding="UTF-8"?>
 <?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
 <?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
 <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd";>
-
 <glsa id="200502-32">
   <title>UnAce: Buffer overflow and directory traversal vulnerabilities</title>
-  <synopsis>
-    UnAce is vulnerable to several buffer overflow and directory traversal
-    attacks.
+  <synopsis>UnAce is vulnerable to several buffer overflow and directory
+    traversal attacks.
   </synopsis>
   <product type="ebuild">unace</product>
   <announced>February 28, 2005</announced>
-  <revised>February 28, 2005: 01</revised>
+  <revised>May 19, 2014: 2</revised>
   <bug>81958</bug>
   <access>remote</access>
   <affected>
     <package name="app-arch/unace" auto="yes" arch="*">
-      <unaffected range="rge">1.2b-r1</unaffected>
-      <vulnerable range="le">1.2b</vulnerable>
-      <vulnerable range="ge">2.0</vulnerable>
+      <unaffected range="ge">2.5-r3</unaffected>
+      <vulnerable range="le">2.5-r3</vulnerable>
     </package>
   </affected>
   <background>
-    <p>
-    UnAce is an utility to extract, view and test the contents of an
-    ACE archive.
+    <p>UnAce is an utility to extract, view and test the contents of an ACE
+      archive.
     </p>
   </background>
   <description>
-    <p>
-    Ulf Harnhammar discovered that UnAce suffers from buffer overflows
-    when testing, unpacking or listing specially crafted ACE archives
-    (CAN-2005-0160). He also found out that UnAce is vulnerable to
-    directory traversal attacks, if an archive contains "./.." sequences or
-    absolute filenames (CAN-2005-0161).
+    <p>Ulf Harnhammar discovered that UnAce suffers from buffer overflows when
+      testing, unpacking or listing specially crafted ACE archives
+      (CAN-2005-0160). He also found out that UnAce is vulnerable to directory
+      traversal attacks, if an archive contains “./..” sequences or
+      absolute filenames (CAN-2005-0161).
     </p>
   </description>
   <impact type="normal">
-    <p>
-    An attacker could exploit the buffer overflows to execute
-    malicious code or the directory traversals to overwrite arbitrary
-    files.
+    <p>An attacker could exploit the buffer overflows to execute malicious code
+      or the directory traversals to overwrite arbitrary files.
     </p>
   </impact>
   <workaround>
-    <p>
-    There is no known workaround at this time.
-    </p>
+    <p>There is no known workaround at this time.</p>
   </workaround>
   <resolution>
-    <p>
-    All UnAce users should upgrade to the latest available 1.2
-    version:
-    </p>
+    <p>All UnAce users should upgrade to the latest available version:</p>
+    
     <code>
-    # emerge --sync
-    # emerge --ask --oneshot --verbose 
&quot;&gt;=app-arch/unace-1.2b-r1&quot;</code>
+      # emerge --sync
+      # emerge --ask --oneshot --verbose "&gt;=app-arch/unace-2.5-r3"
+    </code>
+    
   </resolution>
   <references>
-    <uri 
link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0160";>CAN-2005-0160</uri>
-    <uri 
link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0161";>CAN-2005-0161</uri>
+    <uri 
link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0160";>
+      CAN-2005-0160
+    </uri>
+    <uri 
link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0161";>
+      CAN-2005-0161
+    </uri>
   </references>
-  <metadata tag="requester" timestamp="Sun, 27 Feb 2005 14:45:09 +0000">
-    vorlon078
-  </metadata>
-  <metadata tag="submitter" timestamp="Sun, 27 Feb 2005 15:41:01 +0000">
-    DerCorny
-  </metadata>
-  <metadata tag="bugReady" timestamp="Mon, 28 Feb 2005 15:45:17 +0000">
-    koon
-  </metadata>
+  <metadata tag="requester" timestamp="Fri, 07 Oct 2011 22:18:40 
+0000">system</metadata>
+  <metadata tag="submitter" timestamp="Mon, 19 May 2014 00:38:42 
+0000">system</metadata>
+  <metadata tag="bugReady" timestamp="Mon, 19 May 2014 02:38:44 
+0200">system</metadata>
 </glsa>




Reply via email to