exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2009-139

Mandriva Linux Security Advisory 2009-139
Posted Jun 25, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-139 - A security vulnerability has been identified and corrected in libtorrent-rasterbar. Directory traversal vulnerability in src/torrent_info.cpp in Rasterbar libtorrent before 0.14.4, as used in firetorrent, qBittorrent, deluge Torrent, and other applications, allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) and partial relative pathname in a Multiple File Mode list element in a .torrent file. The updated packages have been patched to prevent this.

tags | advisory, remote, arbitrary
systems | linux, mandriva
advisories | CVE-2009-1760
SHA-256 | df968b48a75671252ad5e27d386882167cc1f161476de70fd745f1c69c1f311c

Mandriva Linux Security Advisory 2009-139

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:139
http://www.mandriva.com/security/
_______________________________________________________________________

Package : libtorrent-rasterbar
Date : June 24, 2009
Affected: 2009.1
_______________________________________________________________________

Problem Description:

A security vulnerability has been identified and corrected in
libtorrent-rasterbar:

Directory traversal vulnerability in src/torrent_info.cpp in Rasterbar
libtorrent before 0.14.4, as used in firetorrent, qBittorrent, deluge
Torrent, and other applications, allows remote attackers to create
or overwrite arbitrary files via a .. (dot dot) and partial relative
pathname in a Multiple File Mode list element in a .torrent file
(CVE-2009-1760).

The updated packages have been patched to prevent this.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1760
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.1:
018c83239c8d6d257e8f722abaf73ac4 2009.1/i586/libtorrent-rasterbar1-0.14.1-4.1mdv2009.1.i586.rpm
af514bb4fd8ff292d769ee200d1ca5f7 2009.1/i586/libtorrent-rasterbar-devel-0.14.1-4.1mdv2009.1.i586.rpm
26ef9d0a438bb34e12c301d25682c7c5 2009.1/i586/python-libtorrent-rasterbar-0.14.1-4.1mdv2009.1.i586.rpm
be0c5e47f7a9205785bea2cb8e879c77 2009.1/SRPMS/libtorrent-rasterbar-0.14.1-4.1mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
0d5fd577ea535f7f440f11b172d2a5f3 2009.1/x86_64/lib64torrent-rasterbar1-0.14.1-4.1mdv2009.1.x86_64.rpm
ddd105e9179360e4c6c5fb77cc2635db 2009.1/x86_64/lib64torrent-rasterbar-devel-0.14.1-4.1mdv2009.1.x86_64.rpm
bd3517f878999688492af5e93080df93 2009.1/x86_64/python-libtorrent-rasterbar-0.14.1-4.1mdv2009.1.x86_64.rpm
be0c5e47f7a9205785bea2cb8e879c77 2009.1/SRPMS/libtorrent-rasterbar-0.14.1-4.1mdv2009.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKQhO0mqjQ0CJFipgRAtU8AKDBOKICcqU/z1ZssSIAlry8zaLLjACg3I6x
mLZjhVni+E+8POjvi/7Ta6Q=
=7iKP
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close