Bug 913635 (CVE-2015-1193) - VUL-0: CVE-2015-1193 CVE-2015-1194: pax: path traversal and symlink following vulnerability
Summary: VUL-0: CVE-2015-1193 CVE-2015-1194: pax: path traversal and symlink followi...
Status: RESOLVED WONTFIX
Alias: CVE-2015-1193
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2015-03-19
Assignee: Thorsten Kukuk
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/112760/
Whiteboard: maint:running:60931:moderate CVSSv2:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-01-19 09:18 UTC by Victor Pereira
Modified: 2016-09-08 12:22 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2015-01-19 09:18:27 UTC
CVE-2015-1193 and CVE-2015-1194

paxtar is susceptible to directory traversal vulnerabilities. They can 
be exploited by a rogue archive to write files outside the current 
directory.

1. paxtar will extract files with .. components in names.

For example, let's create a sample archive:

  echo hello > ../file
  paxtar cvf test.tar ../file
  rm ../file

and then test it:

  paxtar xvf test.tar

This will create a file "../file".

2. While extracting an archive, it will extract symlinks and then follow 
them if they are referenced in further entries.

For example, let's create a sample archive:

  ln -s /tmp dir
  paxtar cvf test.tar dir
  rm dir
  mkdir dir
  echo hello > dir/file
  paxtar rvf test.tar dir/file
  rm -r dir

and then test it:

  paxtar xvf test.tar

This will create a symlink "dir" in the current directory and a file 
"/tmp/file". 

References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774716
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1193
http://seclists.org/oss-sec/2015/q1/170
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1193.html
Comment 1 Swamp Workflow Management 2015-01-19 23:01:32 UTC
bugbot adjusting priority
Comment 2 Swamp Workflow Management 2015-03-05 10:30:37 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-03-19.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/60931
Comment 3 Thorsten Kukuk 2015-03-05 10:54:55 UTC
(In reply to Swamp Workflow Management from comment #2)

> Please submit fixed packages until 2015-03-19.

Since no working fixes exist, that's impossible. Upstream reverted all changes because they made more problems then they fixed.
Comment 4 Marcus Meissner 2015-03-05 14:54:30 UTC
I canceled the swamp again.
Comment 5 Thorsten Kukuk 2015-06-08 11:51:53 UTC
I don't see that anybody is really interested in fixing this.
We removed pax for SLE12 SP1 and replaced it with star, closing this one as wontfix.