First published: Tue Dec 16 2014(Updated: )
Heap-based buffer overflow in the getZip64Data function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Unzip Project Unzip | <=6.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =6.6 | |
Red Hat Enterprise Linux Server | =7.1 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =6.6 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8141 has a high severity rating due to the potential for remote code execution.
To fix CVE-2014-8141, upgrade to a version of Info-ZIP UnZip later than 6.0 that addresses this vulnerability.
CVE-2014-8141 affects Info-ZIP UnZip 6.0 and earlier versions, as well as several Red Hat Enterprise Linux versions.
Yes, CVE-2014-8141 can be exploited remotely via a crafted zip file when using the -t command argument.
CVE-2014-8141 is classified as a heap-based buffer overflow vulnerability.