Hello,

On Thu, 7 Apr 2005, Cleve Philippe wrote:

> Hi,
>
> Searching information about Midnight Commander on the net, I've found
> multiple documents saying:
>
> "A vulnerability has been identified in Midnight Commander (mc), which
> potentially can be exploited by malicious people to compromise a user's
> system.
>
> The vulnerability is caused due to a boundary error when handling
> symlinks in compressed files. This can be exploited by constructing a
> compressed file containing overly long, specially crafted symlinks. This
> will cause a stack overflow when a user tries to view the content of the
> malicious compressed file using mc.
>
> The vulnerability has been confirmed in version 4.5.55 but should
> reportedly affect versions 4.5.52 through 4.6.0."
>
> Where are currently using mc 4.6.0 on Solaris 9.
>
> What's the situation in our case?

Your version has this vulnerability.

> Does any correction exist?

Yes. This vulnerability has been fixed in MC 4.6.1-pre2 and up.
You can download an unofficial release from
http://pavelsh.pp.ru/wiki/doku.php?id=mc-prerelease

or get MC from CVS (use the MC_4_6_1_PRE branch).
_______________________________________________
Mc mailing list
http://mail.gnome.org/mailman/listinfo/mc

Reply via email to