First published: Fri Nov 06 2015(Updated: )
Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.04 | |
Ubuntu Linux | =15.10 | |
Debian | =7.0 | |
Debian | =8.0 | |
unzip | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7696 is categorized as a high-severity vulnerability that can lead to denial of service or arbitrary code execution.
To fix CVE-2015-7696, upgrade to a patched version of the UnZip software or implement other security controls to mitigate the risk.
CVE-2015-7696 affects various versions of Ubuntu Linux (12.04, 14.04, 15.04, 15.10) and Debian GNU/Linux (7.0, 8.0) as well as UnZip version 6.0.
CVE-2015-7696 can be exploited by remote attackers using crafted password-protected ZIP archives to trigger a denial of service or potentially execute arbitrary code.
While there may not be widespread public exploitation reports, CVE-2015-7696 remains a significant risk, and it is advisable to apply mitigations promptly.