First published: Thu Jul 12 2012(Updated: )
Integer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to execute arbitrary code via the size and offset values for the central directory in a zip archive, which triggers "improper restrictions of operations within the bounds of a memory buffer" and an information leak.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libzip | =0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1163 is considered to have a critical severity rating due to the potential for remote code execution.
To fix CVE-2012-1163, update to a newer version of libzip that has addressed this vulnerability.
CVE-2012-1163 specifically affects libzip version 0.10.
Yes, CVE-2012-1163 can be exploited remotely by attackers through crafted zip archives.
If you are using an affected version of libzip, you should immediately apply security updates or patches to mitigate the risk.