First published: Tue Mar 06 2018(Updated: )
An issue was discovered in ZZIPlib 0.13.68. There is a bus error caused by the __zzip_parse_root_directory function of zip.c. Attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/zziplib | <0.13.69 | 0.13.69 |
debian/zziplib | 0.13.62-3.3+deb11u1 0.13.72+dfsg.1-1.1 0.13.72+dfsg.1-1.2 0.13.72+dfsg.1-1.3 | |
zziplib | =0.13.68 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Ubuntu | =18.04 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7726 has a severity rating that indicates it can lead to denial of service.
To mitigate CVE-2018-7726, upgrade ZZIPlib to version 0.13.69 or later.
ZZIPlib versions up to and including 0.13.68 are affected by CVE-2018-7726.
Yes, CVE-2018-7726 can be exploited remotely through the use of a crafted zip file.
CVE-2018-7726 is a bus error vulnerability resulting from improper handling of zip file parsing.