First published: Wed Mar 01 2017(Updated: )
Heap-based buffer overflow in the __zzip_get64 function in fetch.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
zziplib | =0.13.56 | |
zziplib | =0.13.57 | |
zziplib | =0.13.58 | |
zziplib | =0.13.59 | |
zziplib | =0.13.60 | |
zziplib | =0.13.61 | |
zziplib | =0.13.62 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5975 has a high severity rating due to its potential to cause a denial of service.
To fix CVE-2017-5975, upgrade zziplib to version 0.13.63 or later.
CVE-2017-5975 affects zziplib versions 0.13.56 to 0.13.62.
CVE-2017-5975 is a heap-based buffer overflow vulnerability.
Yes, CVE-2017-5975 can be exploited by remote attackers using crafted ZIP files.