First published: Tue Dec 16 2014(Updated: )
Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Unzip Project Unzip | <=6.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =6.6 | |
Redhat Enterprise Linux Server Aus | =7.3 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Aus | =7.7 | |
Redhat Enterprise Linux Server Eus | =6.6 | |
Redhat Enterprise Linux Server Eus | =7.1 | |
Redhat Enterprise Linux Server Eus | =7.2 | |
Redhat Enterprise Linux Server Eus | =7.3 | |
Redhat Enterprise Linux Server Eus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.7 | |
Redhat Enterprise Linux Server Tus | =6.6 | |
Redhat Enterprise Linux Server Tus | =7.3 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.7 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8140 is a heap-based buffer overflow vulnerability in Info-ZIP UnZip 6.0 and earlier.
The severity of CVE-2014-8140 is high with a CVSS score of 7.8.
CVE-2014-8140 allows remote attackers to execute arbitrary code by exploiting the buffer overflow through a crafted zip file in the -t command argument to the unzip command.
UnZip 6.0 and earlier versions are affected by CVE-2014-8140.
You can find more information about CVE-2014-8140 in the following references: [ocert.org](http://www.ocert.org/advisories/ocert-2014-011.html), [securitytracker.com](http://www.securitytracker.com/id/1031433), [access.redhat.com](https://access.redhat.com/errata/RHSA-2015:0700).