Lucene search

K
gentooGentoo FoundationGLSA-200411-16
HistoryNov 09, 2004 - 12:00 a.m.

zip: Path name buffer overflow

2004-11-0900:00:00
Gentoo Foundation
security.gentoo.org
13

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.175 Low

EPSS

Percentile

96.2%

Background

zip is a compression and file packaging utility.

Description

zip does not check the resulting path length when doing recursive folder compression.

Impact

An attacker could exploit this by enticing another user or web application to create an archive including a specially-crafted path name, potentially resulting in the execution of arbitrary code with the permissions of the user running zip.

Workaround

There is no known workaround at this time.

Resolution

All zip users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-arch/zip-2.3-r4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-arch/zip<= 2.3-r3UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.175 Low

EPSS

Percentile

96.2%