X-Diesel Unreal Commander v0.92 (build 573) multiple vulnerabilities
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: X-Diesel Unreal Commander v0.92 (build 573) multiple vulnerabilities
- From: "Gynvael Coldwind" <gynvael@xxxxxxxxxxxxx>
- Date: Thu, 23 Aug 2007 13:39:44 +0200
- Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:sender:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition:x-google-sender-auth; b=iN037JIfjiG/dd0uYILIgY3P8bFm8662cMsxwe3EHrpobryJNsiMBoftgYwtu5fRNBxQJ7qiswLXkPO3lEP0UR8SBVuqACZV4hCBTYTPJ3OWMfQiUKBwP46Yzza/KbfqM0sJgTfAQLm4xRyCcFVLIJyaqJfSZ1lLpxaliLf6ncE=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:sender:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition:x-google-sender-auth; b=feybM40ytUijwRwJcA0D6cSC1DGHSz2aCk2gBV3Mk9hEEeA05hoeZnrGhQP3WhW76EvvnzDZ0mA5Mb2XXdGImNYe3LYEuvmE9lcBfXUeKNvwZffwc4l2n1seRSlz2DGY19suIrUthvUQtMCn0+nBo2C2nWYzc6OUNB+Kq4kbQ7U=
- List-help: <mailto:bugtraq-help@securityfocus.com>
- List-id: <bugtraq.list-id.securityfocus.com>
- List-post: <mailto:bugtraq@securityfocus.com>
- List-subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
- List-unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
- Mailing-list: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
- Sender: gynvael@xxxxxxxxx
HISPASEC
Security Advisory
http://blog.hispasec.com/lab/
Name : X-Diesel Unreal Commander v0.92 (build 573) multiple
vulnerabilities
Class : Local/Remote multiple directory traversal (Input
Validation Error)
Threat level : HIGH
Discovered : 2007-08-09
Published : 2007-08-23
Credit : Gynvael Coldwind
Vulnerable : 0.92 (build 573), 0.92 (build 565), prior also may be affected
== Abstract ==
Unreal Commander is an award winning freeware file manager for Windows
98/ME/2000/XP/2003/Vista. The application support multiple archive
formats, has a built-in ftp client, and other features.
Unreal Commander fails to check user-supplied input while processing
ZIP and RAR archives. A malformed ZIP or RAR file can be used to
perform a directory traversal attack and place malware files in a
location selected by the attacker. Successful exploitation can lead to
a full compromitation of the system.
== Details ==
1. ZIP directory traversal
The file name in a ZIP archive in the central directory can be
malformed so that it contains upwards directory traversal, for
example:
Something/../../../../../../Program Files/Something/ws2_32.dll
If the user upacks such an archive, the Unreal Commander will create
the file ws2_32.dll in the specified directory, instead of the
directory where the user wants to extract it. This may lead to system
compromitation, especially if the user executes Unreal Commander with
admin privileges.
PoC: http://blog.hispasec.com/lab/files/UnrealCommander_PoC_traversal.zip
2. ZIP name spoofing
A ZIP archive contains two places where a file's name is written:
Local file header and Central Directory. Unreal Commander displays the
file name according to the Central Directory, but extracts the file
with the name from the Local File Header. This is may misinform the
user about the files contained in the archive. This can help an
attacker to trick the user into extracting a dangerous file (for
example, an .ani file on an unpacked Windows).
PoC: http://blog.hispasec.com/lab/files/UnrealCommander_PoC_spoof.zip
3. ZIP file size heap information leak
If the ZIP has a malformed file size in the file header, then Unreal
Commander writes to the file data from the heap. This could allow
potential information leak (ftp passwords ?), but this has not been
confirmed.
4. RAR directory traversal
Like point 1, but regarding to RAR format.
== Vendor status and solution ==
The vendor has been informed, but has not yet released a proper patch.
The solution is to check if a RAR or ZIP file contains ".." in the
names of the files in the archives. It is also advised not to run
Unreal Commander with administrative privileges.
== Disclaimer ==
This document and all the information it contains is provided "as is",
without any warranty. Hispasec Sistemas is not responsible for the
misuse of the information provided in this advisory. The advisory is
provided for educational purposes only.
Permission is hereby granted to redistribute this advisory, providing
that no changes are made and that the copyright notices and
disclaimers remain intact.
Copyright (C) 2007 Hispasec Sistemas.
--
Gynvael Coldwind
mailto: gynvael@xxxxxxxxxxxxx
mailto: michael@xxxxxxxxxxxx