First published: Mon Jan 24 2022(Updated: )
A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Unzip Project Unzip | =6.0 | |
Fedoraproject Fedora | =35 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
debian/unzip | <=6.0-26+deb11u1<=6.0-28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4217 is a vulnerability in unzip that occurs due to improper handling of Unicode strings, leading to a null pointer dereference.
CVE-2021-4217 affects the unzip software versions 6.0, Fedora 35, Red Hat Enterprise Linux 6.0, 7.0, 8.0, and 9.0.
CVE-2021-4217 has a severity value of 3.3, which is considered low.
An attacker can exploit CVE-2021-4217 by inputting a specially crafted zip file, which can lead to a crash or code execution.
Yes, there are fixes available for CVE-2021-4217. It is recommended to update to the latest version of unzip or apply the necessary patches provided by the respective vendors.