Debian Security Advisory DSA 652-1 (unarj)

Summary
The remote host is missing an update to unarj announced via advisory DSA 652-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20652-1
Insight
Several vulnerabilities have been discovered in unarj, a non-free ARJ unarchive utility. The Common Vulnerabilities and Exposures Project identifies the following vulnerabilities: CVE-2004-0947 A buffer overflow has been discovered when handling long file names contained in an archive. An attacker could create a specially crafted archive which could cause unarj to crash or possibly execute arbitrary code when being extracted by a victim. CVE-2004-1027 A directory traversal vulnerability has been found so that an attacker could create a specially crafted archive which would create files in the parent directory when being extracted by a victim. When used recursively, this vulnerability could be used to overwrite critical system files and programs. For the stable distribution (woody) these problems have been fixed in version 2.43-3woody1. For the unstable distribution (sid) these problems don't apply since unstable/non-free does not contain the unarj package. We recommend that you upgrade your unarj package.