First published: Wed Sep 25 2019(Updated: )
A vulnerability was found in Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption). Reference: <a href="https://github.com/rubyzip/rubyzip/pull/403">https://github.com/rubyzip/rubyzip/pull/403</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
<1.3.0 | ||
=29 | ||
=30 | ||
=31 | ||
=4.7 | ||
=5.11 | ||
Rubyzip Project Rubyzip | <1.3.0 | |
rubygems/rubyzip | <1.3.0 | 1.3.0 |
redhat/Rubyzip | <1.3.0 | 1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-16892.
The severity of CVE-2019-16892 is high.
CVE-2019-16892 affects Rubyzip versions before 1.3.0.
The impact of CVE-2019-16892 is a denial of service (disk consumption).
To fix CVE-2019-16892, update Rubyzip to version 1.3.0 or later.