CVE-2015-2782
https://notcve.org/view.php?id=CVE-2015-2782
Buffer overflow in Open-source ARJ archiver 3.10.22 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ARJ archive. Desbordamiento de buffer en el archivador de código abierto ARJ 3.10.22 permite a atacantes remotos causar una denegación de servicio (caída) o posiblemente ejecutar código arbitrario a través de un archivo ARJ manipulado. • http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154518.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154605.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155011.html http://www.debian.org/security/2015/dsa-3213 http://www.mandriva.com/security/advisories?name=MDVSA-2015:201 http://www.openwall.com/lists/oss-security/2015/03/28/5 http://www.openwall.com/lists/oss-security/2015/03/29/1 http://www.securityfocus • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-0556
https://notcve.org/view.php?id=CVE-2015-0556
Open-source ARJ archiver 3.10.22 allows remote attackers to conduct directory traversal attacks via a symlink attack in an ARJ archive. El archivador de código abierto ARJ 3.10.22 permite a atacantes remotos realizar ataques de salto de directorio a través de un ataque de enlace simbólico en un archivo ARJ. • http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154518.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154605.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155011.html http://www.debian.org/security/2015/dsa-3213 http://www.mandriva.com/security/advisories?name=MDVSA-2015:201 http://www.openwall.com/lists/oss-security/2015/01/03/5 http://www.openwall.com/lists/oss-security/2015/01/05/9 http://www.securityfocus • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2015-0557
https://notcve.org/view.php?id=CVE-2015-0557
Open-source ARJ archiver 3.10.22 does not properly remove leading slashes from paths, which allows remote attackers to conduct absolute path traversal attacks and write to arbitrary files via multiple leading slashes in a path in an ARJ archive. El archivador de código abierto ARJ 3.10.22 no elimina correctamente barras oblicuas de inicio de las rutas, lo que permite a atacantes remotos realizar ataques del recorrido del directorio absoluto y escribir a ficheros arbitrarios a través de múltiples barra oblicuas de inicio en una ruta en un archivo ARJ. • http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154518.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154605.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155011.html http://www.debian.org/security/2015/dsa-3213 http://www.mandriva.com/security/advisories?name=MDVSA-2015:201 http://www.openwall.com/lists/oss-security/2015/01/03/5 http://www.openwall.com/lists/oss-security/2015/01/05/9 http://www.securityfocus • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •