In ZZIPlib 0.13.68, there is an uncontrolled memory allocation and a crash in the __zzip_parse_root_directory function of zzip/zip.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103050 | Third Party Advisory VDB Entry |
https://github.com/gdraheim/zziplib/issues/22 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00022.html | Mailing List Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00029.html | |
https://usn.ubuntu.com/3699-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2018-02-09 06:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-6869
Mitre link : CVE-2018-6869
CVE.ORG link : CVE-2018-6869
JSON object : View
Products Affected
debian
- debian_linux
zziplib_project
- zziplib
canonical
- ubuntu_linux
CWE
CWE-770
Allocation of Resources Without Limits or Throttling