First published: Tue Dec 16 2014(Updated: )
oCERT reports an unzip flaw discovered by Michele Spagnuolo, Google Security Team: """ The read errors show problems in process.c:getZip64Data(), which lacked any error detection or reporting, and was trying to extract multi-byte data from a buffer which did not contain enough bytes. Proposed changes: <a href="http://antinode.info/ftp/info-zip/unzip60/fileio.c">http://antinode.info/ftp/info-zip/unzip60/fileio.c</a> fileio.c:do_string() looks at the status value returned from process.c:getZip64Data(), and puts out a new warning. <a href="http://antinode.info/ftp/info-zip/unzip60/process.c">http://antinode.info/ftp/info-zip/unzip60/process.c</a> process.c:getZip64Data() gets new validity tests, and it returns a useful status value. """ Acknowledgement: Red Hat would like to thank oCERT for reporting these issues. oCERT acknowledges Michele Spagnuolo of the Google Security Team as the original reporter.
Affected Software | Affected Version | How to fix |
---|---|---|
Info-ZIP Zip |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1174856 is considered high due to the unzip flaw that can lead to improper error handling and potential data extraction issues.
To fix REDHAT-BUG-1174856, update to the latest version of Info-ZIP Unzip that addresses the vulnerability promptly.
REDHAT-BUG-1174856 affects Info-ZIP Unzip across various versions.
REDHAT-BUG-1174856 can lead to data corruption or extraction issues due to improper handling of ZIP file structures.
The flaw reported in REDHAT-BUG-1174856 was discovered by Michele Spagnuolo from the Google Security Team.