USN-159-1: unzip vulnerability
1 August 2005
unzip vulnerability
Releases
Details
If a ZIP archive contains binaries with the setuid and/or setgid bit
set, unzip preserved those bits when extracting the archive. This
could be exploited by tricking the administrator into unzipping an
archive with a setuid-root binary into a directory the attacker can
access. This allowed the attacker to execute arbitrary commands with
root privileges.
The updated version does not preserve setuid, setgid, and sticky bits
any more by default. The old behaviour can be explicitly requested now
by supplying the option '-K'.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 5.04
-
unzip
-
Ubuntu 4.10
-
unzip
-
In general, a standard system update will make all the necessary changes.