Name | CVE-2014-9983 |
Description | Directory Traversal exists in RAR 4.x and 5.x because an unpack operation follows any symlinks, including symlinks contained in the archive. This allows remote attackers to write to arbitrary files via a crafted archive. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 774172 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
rar (PTS) | jessie/non-free | 2:4.2.0+dfsg.1-0.1 | vulnerable |
| stretch/non-free | 2:6.23-1~deb9u1 | fixed |
| buster/non-free (security), buster/non-free | 2:6.23-1~deb10u1 | fixed |
| bullseye/non-free | 2:6.23-1~deb11u1 | fixed |
| bookworm/non-free | 2:6.23-1~deb12u1 | fixed |
| trixie/non-free | 2:7.01-1 | fixed |
| sid/non-free | 2:7.10~b1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
rar | source | (unstable) | 2:5.3.b2-1 | | | 774172 |
Notes
[jessie] - rar <no-dsa> (Non-free not supported)
[wheezy] - rar <no-dsa> (Non-free not supported)
[squeeze] - rar <no-dsa> (Not fixed upstream and license does not allow modification)
Version 5.21 upstream changes behaviour: by default rar skips symbolic links
symbolic links with absolute paths in link target when extracting.