Archive::Zip does not properly parse Zip files and may incorrectly interpret malformed zip archives to contain zero length/size files. As a a result, anti-virus software using Archive::Zip may fail to detect malicious content within a Zip archive.
The Archive::Zip module allows PERL programs to manipulate Zip archives. An attacker may be able to create a specially crafted Zip archive that could cause Archive::Zip to interpret files in the archive as having zero length. If anti-virus software is using Archive::Zip to scan Zip attachments, it may fail to detect the malicious content and allow the archive into the system.
A remote attacker may be able to craft a malicious Zip archive that will evade detection by anti-virus software using Archive::Zip. Once in the system, if the remote attacker can persuade the user to accesses the malicious archive, the attacker may be able to execute arbitrary code on that user's system, possibly with administrator privileges.
This issue has been addressed in Archive::Zip version 1.4.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Updated: November 12, 2004
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | |
Temporal | |
Environmental | |
This vulnerability was publicly reported by iDefense.
This document was written by Jeff Gennari.
CVE IDs: | None
Severity Metric: | 3.59
Date Public: | 2004-10-18
Date First Published: | 2004-11-12
Date Last Updated: | 2004-11-15 15:35 UTC
Document Revision: | 131