First published: Thu Oct 25 2018(Updated: )
Info-ZIP UnZip 6.0 has a buffer overflow in list.c, when a ZIP archive has a crafted relationship between the compressed-size value and the uncompressed-size value, because a buffer size is 10 and is supposed to be 12. References: <a href="https://bugzilla.suse.com/show_bug.cgi?id=1110194">https://bugzilla.suse.com/show_bug.cgi?id=1110194</a> <a href="https://sourceforge.net/p/infozip/bugs/53/">https://sourceforge.net/p/infozip/bugs/53/</a> <a href="https://src.fedoraproject.org/rpms/unzip/blob/master/f/unzip-6.0-overflow-long-fsize.patch">https://src.fedoraproject.org/rpms/unzip/blob/master/f/unzip-6.0-overflow-long-fsize.patch</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Info-ZIP Zip |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1642931 is considered critical due to the potential for buffer overflow exploits.
The recommended fix for REDHAT-BUG-1642931 is to apply the latest security patch provided by Info-ZIP for UnZip.
Exploits associated with REDHAT-BUG-1642931 can lead to arbitrary code execution through crafted ZIP files.
Info-ZIP UnZip version 6.0 is specifically affected by REDHAT-BUG-1642931.
The potential impacts of REDHAT-BUG-1642931 include system crashes and compromised system integrity through arbitrary code execution.