<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for unrar</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1658-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-06-22T18:56:08Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-06-22T18:56:08Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-06-22T18:56:08Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for unrar</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for unrar to version 5.5 fixes the following issues:

Version 5.5.5

* CVE-2012-6706: fixes VMSF_DELTA memory corruption (boo#1045315)
  see https://bugs.chromium.org/p/project-zero/issues/detail?id=1286&amp;can=1&amp;q=unrar&amp;desc=2

Version 5.5.1

* Based on RAR 5.50 beta1
* Added extraction support for .LZ archives created by Lzip
  compressor.
* Modern TAR tools can store high precision file times, lengthy
  file names and large file sizes in special PAX extended headers
  inside of TAR archive. Now WinRAR supports such PAX headers
  and uses them when extracting TAR archives.
* unrar no longer fails to unpack files in ZIP archives compressed
  with XZ algorithm and encrypted with AES

Version 5.4.5.

* Based on final RAR 5.40.
* If RAR recovery volumes (.rev files) are present in the same
  folder as usual RAR volumes, archive test command verifies .rev
  contents after completing testing .rar files.
  If you wish to test only .rev files without checking .rar
  volumes, you can run: `unrar t arcname.part1.rev`.
* If -p switch is used without optional &lt;pwd&gt; parameter, a
  password can be also set with file redirection or pipe.
* unrar treats 'arcname.partN' as 'arcname.partN.rar' if
  'arcname.partN' does not exist and 'arcname.part#.rar' exists.
  For example, it is allowed to run:
  `unrar x arcname.part01` to start extraction from
  'arcname.part01.rar'.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00085.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:1658-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2 NonFree">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2 NonFree">
        <FullProductName ProductID="openSUSE Leap 42.2 NonFree">openSUSE Leap 42.2 NonFree</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libunrar-devel-5.5.5-3.1">
      <FullProductName ProductID="libunrar-devel-5.5.5-3.1">libunrar-devel-5.5.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libunrar5_5_5-5.5.5-3.1">
      <FullProductName ProductID="libunrar5_5_5-5.5.5-3.1">libunrar5_5_5-5.5.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="unrar-5.5.5-3.1">
      <FullProductName ProductID="unrar-5.5.5-3.1">unrar-5.5.5-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libunrar-devel-5.5.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2 NonFree">
      <FullProductName ProductID="openSUSE Leap 42.2 NonFree:libunrar-devel-5.5.5-3.1">libunrar-devel-5.5.5-3.1 as a component of openSUSE Leap 42.2 NonFree</FullProductName>
    </Relationship>
    <Relationship ProductReference="libunrar5_5_5-5.5.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2 NonFree">
      <FullProductName ProductID="openSUSE Leap 42.2 NonFree:libunrar5_5_5-5.5.5-3.1">libunrar5_5_5-5.5.5-3.1 as a component of openSUSE Leap 42.2 NonFree</FullProductName>
    </Relationship>
    <Relationship ProductReference="unrar-5.5.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2 NonFree">
      <FullProductName ProductID="openSUSE Leap 42.2 NonFree:unrar-5.5.5-3.1">unrar-5.5.5-3.1 as a component of openSUSE Leap 42.2 NonFree</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].</Note>
    </Notes>
    <CVE>CVE-2012-6706</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2 NonFree:libunrar-devel-5.5.5-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2 NonFree:libunrar5_5_5-5.5.5-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2 NonFree:unrar-5.5.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00085.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-6706.html</URL>
        <Description>CVE-2012-6706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045315</URL>
        <Description>SUSE Bug 1045315</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045490</URL>
        <Description>SUSE Bug 1045490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051712</URL>
        <Description>SUSE Bug 1051712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083915</URL>
        <Description>SUSE Bug 1083915</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
