First published: Fri Feb 06 2015(Updated: )
unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
unzip | =6.0 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Debian | =7.0 | |
Fedora | =20 | |
Fedora | =21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9636 is rated as a denial of service vulnerability due to potential crashes caused by out-of-bounds reads or writes.
To mitigate CVE-2014-9636, update to a patched version of Unzip or apply relevant security patches provided by your Linux distribution.
CVE-2014-9636 affects Unzip version 6.0, as well as specific versions of Ubuntu, Debian, and Fedora.
Yes, CVE-2014-9636 can be exploited remotely by attackers through specially crafted zip files.
CVE-2014-9636 impacts platforms running Unzip 6.0 and various Linux distributions like Ubuntu, Debian, and Fedora.