First published: Tue Dec 16 2014(Updated: )
oCERT reports unzip flaw discovered by Michele Spagnuolo, Google Security Team. """ I would like to report a heap overflow condition in the CRC32 verification of unzip, which may result in arbitrary code execution. It can be triggered by passing a maliciously crafted zip files to unzip -t (version 6.00, both InfoZip and Debian). Patches: The problem was an unrealistic/invalid value in a .ZIP Extra Field. There was a check (in extract.c:TestExtraField()) for an extra-block length that was too large, but no check for a too-small value. In this example, the length (ebLen) was 1, and when "(ebLen-4)" was passed to crc32(), bad things happened. A revised extract.c (which adds a new check and error message) should be available here: <a href="http://antinode.info/ftp/unzip60/extract.c">http://antinode.info/ftp/unzip60/extract.c</a> """ Acknowledgement: Red Hat would like to thank oCERT for reporting these issues. oCERT acknowledges Michele Spagnuolo of the Google Security Team as the original reporter.
Affected Software | Affected Version | How to fix |
---|---|---|
Unzip | ||
unzip |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1174844 is high due to the potential for arbitrary code execution.
To fix REDHAT-BUG-1174844, update the unzip package to the latest version provided by your distribution.
REDHAT-BUG-1174844 is caused by a heap overflow condition in the CRC32 verification of the unzip utility.
REDHAT-BUG-1174844 affects the InfoZip unzip and Debian unzip software packages.
Yes, REDHAT-BUG-1174844 can be exploited remotely by processing maliciously crafted zip files.