First published: Mon Aug 20 2018(Updated: )
zutils version prior to version 1.8-pre2 contains a Buffer Overflow vulnerability in zcat that can result in Potential denial of service or arbitrary code execution. This attack appear to be exploitable via the victim openning a crafted compressed file. This vulnerability appears to have been fixed in 1.8-pre2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
nongnu zutils | <=1.8 | |
nongnu zutils | =1.8-pre1 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000637 has a severity rating that indicates it can lead to potential denial of service or arbitrary code execution.
To fix CVE-2018-1000637, upgrade zutils to version 1.8-pre2 or later.
CVE-2018-1000637 is caused by a buffer overflow vulnerability in the zcat utility of zutils.
Versions of zutils prior to 1.8-pre2, including version 1.8 and 1.8-pre1, are affected by CVE-2018-1000637.
Yes, CVE-2018-1000637 can be exploited when a victim opens a specially crafted compressed file.