First published: Thu Jul 12 2012(Updated: )
Heap-based buffer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a zip archive with the number of directories set to 0, related to an "incorrect loop construct."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libzip | =0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1162 is classified as a medium severity vulnerability due to its potential to cause application crashes and execute arbitrary code.
To mitigate CVE-2012-1162, users should upgrade to a version of libzip that is 0.10 or higher, as newer versions contain patches for this vulnerability.
CVE-2012-1162 is a heap-based buffer overflow vulnerability that may be exploited via specially crafted zip archive files.
CVE-2012-1162 affects users of libzip version 0.10, which is utilized in various applications for zip file handling.
Attackers can exploit CVE-2012-1162 to cause a denial of service by crashing applications and potentially executing arbitrary code.