First published: Fri Jun 18 2021(Updated: )
Infinite Loop in zziplib v0.13.69 allows remote attackers to cause a denial of service via the return value "zzip_file_read" in the function "unzzip_cat_file".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/zziplib | 0.13.62-3.2+deb10u1 0.13.62-3.3+deb11u1 0.13.72+dfsg.1-1.1 | |
ubuntu/zziplib | <0.13.72+dfsg.1-1 | 0.13.72+dfsg.1-1 |
ubuntu/zziplib | <0.13.62-3.1ubuntu0.18.04.1+ | 0.13.62-3.1ubuntu0.18.04.1+ |
ubuntu/zziplib | <0.13.62-3.2ubuntu1.1 | 0.13.62-3.2ubuntu1.1 |
ubuntu/zziplib | <0.13.62-3ubuntu0.16.04.2+ | 0.13.62-3ubuntu0.16.04.2+ |
zziplib | =0.13.69 | |
Debian Linux | =9.0 | |
Red Hat Fedora | =34 | |
Red Hat Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-18442 is identified as a denial of service vulnerability due to an infinite loop in zziplib.
To resolve CVE-2020-18442, upgrade zziplib to versions 0.13.62-3.2+deb10u1, 0.13.62-3.3+deb11u1, or 0.13.72+dfsg.1-1.
Affected versions of zziplib include 0.13.69; upgrading to a fixed version is necessary.
Yes, remote attackers can exploit CVE-2020-18442 to create a denial of service condition.
CVE-2020-18442 impacts systems running affected versions of zziplib, including Debian and Fedora.