Vulnerability Name:

CVE-2003-0282 (CCN-12004)

Assigned:2003-05-09
Published:2003-05-09
Updated:2017-10-11
Summary:Directory traversal vulnerability in UnZip 5.50 allows attackers to overwrite arbitrary files via invalid characters between two . (dot) characters, which are filtered and result in a ".." sequence.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: CALDERA
Type: UNKNOWN
CSSA-2003-031.0

Source: CCN
Type: SCO Security Advisory CSSA-2003-031.0
OpenLinux: unzip directory traversal

Source: CCN
Type: BugTraq Mailing List, Fri May 09 2003 - 17:39:24 CDT
unzip directory traversal revisited

Source: MITRE
Type: CNA
CVE-2003-0282

Source: CONECTIVA
Type: UNKNOWN
CLA-2003:672

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:672
unzip

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:724
unzip

Source: IMMUNIX
Type: UNKNOWN
IMNX-2003-7+-017-01

Source: CCN
Type: Immunix Secured OS Security Advisory IMNX-2003-7+-017-01
unzip

Source: BUGTRAQ
Type: UNKNOWN
20030509 unzip directory traversal revisited

Source: BUGTRAQ
Type: UNKNOWN
20030710 [OpenPKG-SA-2003.033] OpenPKG Security Advisory (infozip)

Source: CCN
Type: RHSA-2003-199
Updated unzip packages fix trojan vulnerability

Source: CCN
Type: RHSA-2003-200
unzip security update

Source: CCN
Type: RHSA-2003-218
Updated unzip and tar packages that fix vulnerabilities are now available

Source: CCN
Type: CIAC Information Bulletin N-111
Red Hat Updated unzip Packages Fix Trojan Vulnerability

Source: CIAC
Type: UNKNOWN
N-111

Source: DEBIAN
Type: UNKNOWN
DSA-344

Source: DEBIAN
Type: DSA-344
unzip -- directory traversal

Source: CONFIRM
Type: UNKNOWN
http://www.info-zip.org/FAQ.html

Source: CCN
Type: Gentoo Linux Security Announcement 200307-02
unzip

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:073

Source: CCN
Type: OpenPKG-SA-2003.033
infozip

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:199

Source: REDHAT
Type: UNKNOWN
RHSA-2003:200

Source: BID
Type: Exploit, Patch, Vendor Advisory
7550

Source: CCN
Type: BID-7550
Info-ZIP UnZip Encoded Character Hostile Destination Path Vulnerability

Source: CCN
Type: slackware-security Mailing List, Mon, 25 Aug 2003 20:39:27 -0700 (PDT)
unzip vulnerability patched

Source: CCN
Type: TLSA-2003-42
Files are overwritten

Source: TURBO
Type: UNKNOWN
TLSA-2003-42

Source: XF
Type: UNKNOWN
unzip-dotdot-directory-traversal(12004)

Source: XF
Type: UNKNOWN
unzip-dotdot-directory-traversal(12004)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:619

Vulnerable Configuration:Configuration 1:
  • cpe:/a:info-zip:unzip:5.50:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:sco:openlinux_server:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:sco:openlinux_workstation:3.1.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:info-zip:unzip:5.50:*:*:*:*:*:*:*
  • AND
  • cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.0:*:*:*:workstation:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030282
    V
    CVE-2003-0282
    2015-11-16
    oval:org.debian:def:344
    V
    directory traversal
    2013-01-21
    oval:org.mitre.oval:def:619
    V
    UnZip 5.0 Directory Traversal Vulnerability
    2007-04-25
    BACK
    info-zip unzip 5.50
    sco openlinux server 3.1.1
    sco openlinux workstation 3.1.1
    info-zip unzip 5.50
    freebsd freebsd *
    redhat linux 7
    redhat linux 7.1
    turbolinux turbolinux server 6.5
    conectiva linux 7.0
    redhat linux 7.2
    mandrakesoft mandrake linux 8.2
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    openpkg openpkg current
    gentoo linux *
    redhat linux 8.0
    openpkg openpkg 1.1
    mandrakesoft mandrake linux 9.0
    mandrakesoft mandrake multi network firewall 8.2
    slackware slackware linux current
    turbolinux turbolinux server 6.1
    openpkg openpkg 1.2
    turbolinux turbolinux workstation 6.0
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 9.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat linux 9.0
    slackware slackware linux 9.0
    redhat enterprise linux 2.1
    conectiva linux 9.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 8.2
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux corporate server 2.1