ID OPENVAS:1361412562310874880 Type openvas Reporter Copyright (C) 2018 Greenbone Networks GmbH Modified 2019-03-15T00:00:00
Description
The remote host is missing an update for the
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_fedora_2018_237e9b550c_zziplib_fc28.nasl 14223 2019-03-15 13:49:35Z cfischer $
#
# Fedora Update for zziplib FEDORA-2018-237e9b550c
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.874880");
script_version("$Revision: 14223 $");
script_tag(name:"last_modification", value:"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $");
script_tag(name:"creation_date", value:"2018-08-02 06:04:25 +0200 (Thu, 02 Aug 2018)");
script_cve_id("CVE-2018-6541", "CVE-2018-7727", "CVE-2017-5974", "CVE-2017-5975",
"CVE-2017-5976", "CVE-2017-5977", "CVE-2017-5978", "CVE-2017-5979",
"CVE-2017-5980", "CVE-2017-5981", "CVE-2018-7726");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:P");
script_tag(name:"qod_type", value:"package");
script_name("Fedora Update for zziplib FEDORA-2018-237e9b550c");
script_tag(name:"summary", value:"The remote host is missing an update for the 'zziplib'
package(s) announced via the referenced advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
on the target host.");
script_tag(name:"affected", value:"zziplib on Fedora 28");
script_tag(name:"solution", value:"Please install the updated packages.");
script_xref(name:"FEDORA", value:"2018-237e9b550c");
script_xref(name:"URL", value:"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6J523IVLVVPUEHRDYT54A5QOKM5XVTO");
script_tag(name:"solution_type", value:"VendorFix");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2018 Greenbone Networks GmbH");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms", re:"ssh/login/release=FC28");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "FC28")
{
if ((res = isrpmvuln(pkg:"zziplib", rpm:"zziplib~0.13.69~1.fc28", rls:"FC28")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
{"id": "OPENVAS:1361412562310874880", "bulletinFamily": "scanner", "title": "Fedora Update for zziplib FEDORA-2018-237e9b550c", "description": "The remote host is missing an update for the ", "published": "2018-08-02T00:00:00", "modified": "2019-03-15T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874880", "reporter": "Copyright (C) 2018 Greenbone Networks GmbH", "references": ["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6J523IVLVVPUEHRDYT54A5QOKM5XVTO", "2018-237e9b550c"], "cvelist": ["CVE-2017-5974", "CVE-2018-7726", "CVE-2018-6541", "CVE-2017-5979", "CVE-2017-5976", "CVE-2017-5975", "CVE-2017-5981", "CVE-2017-5980", "CVE-2018-7727", "CVE-2017-5978", "CVE-2017-5977"], "type": "openvas", "lastseen": "2019-05-29T18:33:07", "history": [{"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2017-5974", "CVE-2018-7726", "CVE-2018-6541", "CVE-2017-5979", "CVE-2017-5976", "CVE-2017-5975", "CVE-2017-5981", "CVE-2017-5980", "CVE-2018-7727", "CVE-2017-5978", "CVE-2017-5977"], "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "Check the version of zziplib", "edition": 1, "enchantments": {"score": {"modified": "2018-08-06T13:33:25", "value": 7.5, "vector": "NONE"}}, "hash": "ae63ad10640f1c9c4c23fb4d3d995e30c0e0fb3922aa485327863a89c41d5cfd", "hashmap": [{"hash": "e5d6f39c28c0da0fb105a00f9435a31d", "key": "cvelist"}, {"hash": "481159014dafc38e1494396784a0d747", "key": "sourceData"}, {"hash": "45d8d4bf979ceecbb955d28e51b648de", "key": "href"}, {"hash": "dd542e9b4adf5f7b50b5f6a912ddd33d", "key": "references"}, {"hash": "06d31ea75ce174bd6e8a2331e24a21c2", "key": "modified"}, {"hash": "21d85ac356942e38bedd62956a962b5a", "key": "published"}, {"hash": "3873c836ae45fd496c2b40bae50467ed", "key": "cvss"}, {"hash": "a1abfd5c17ae01e209e7e7f527231f74", "key": "title"}, {"hash": "bd2811809d78a66b4d39bc1fb8b08ee6", "key": "reporter"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "2b66fa153f2147be69e6aa4fa233d1ba", "key": "pluginID"}, {"hash": "274060f34213e5a1c533dc6f0eb11232", "key": "description"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874880", "id": "OPENVAS:1361412562310874880", "lastseen": "2018-08-06T13:33:25", "modified": "2018-08-06T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "1361412562310874880", "published": "2018-08-02T00:00:00", "references": ["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6J523IVLVVPUEHRDYT54A5QOKM5XVTO", "2018-237e9b550c"], "reporter": "Copyright (C) 2018 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_237e9b550c_zziplib_fc28.nasl 10778 2018-08-06 02:57:15Z ckuersteiner $\n#\n# Fedora Update for zziplib FEDORA-2018-237e9b550c\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874880\");\n script_version(\"$Revision: 10778 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-08-06 04:57:15 +0200 (Mon, 06 Aug 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-02 06:04:25 +0200 (Thu, 02 Aug 2018)\");\n script_cve_id(\"CVE-2018-6541\", \"CVE-2018-7727\", \"CVE-2017-5974\", \"CVE-2017-5975\", \n \"CVE-2017-5976\", \"CVE-2017-5977\", \"CVE-2017-5978\", \"CVE-2017-5979\", \n \"CVE-2017-5980\", \"CVE-2017-5981\", \"CVE-2018-7726\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for zziplib FEDORA-2018-237e9b550c\");\n script_tag(name:\"summary\", value:\"Check the version of zziplib\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present \non the target host.\");\n script_tag(name:\"insight\", value:\"The zziplib library is intentionally lightweight, \nit offers the ability to easily extract data from files archived in a single zip \nfile. Applications can bundle files into a single zip archive and access them. \nThe implementation is based only on the (free) subset of compression with the zlib \nalgorithm which is actually used by the zip/unzip tools.\n\");\n script_tag(name:\"affected\", value:\"zziplib on Fedora 28\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-237e9b550c\");\n script_xref(name:\"URL\" , value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6J523IVLVVPUEHRDYT54A5QOKM5XVTO\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"zziplib\", rpm:\"zziplib~0.13.69~1.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "title": "Fedora Update for zziplib FEDORA-2018-237e9b550c", "type": "openvas", "viewCount": 0}, "differentElements": ["cvss"], "edition": 1, "lastseen": "2018-08-06T13:33:25"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2017-5974", "CVE-2018-7726", "CVE-2018-6541", "CVE-2017-5979", "CVE-2017-5976", "CVE-2017-5975", "CVE-2017-5981", "CVE-2017-5980", "CVE-2018-7727", "CVE-2017-5978", "CVE-2017-5977"], "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "The remote host is missing an update for the ", "edition": 4, "enchantments": {"dependencies": {"modified": "2019-03-18T14:23:53", "references": [{"idList": ["RHSA-2018:3229"], "type": "redhat"}, {"idList": ["DEBIAN:DLA-994-1:44807", "DEBIAN:DSA-3878-1:9871A"], "type": "debian"}, {"idList": ["CESA-2018:3229"], "type": "centos"}, {"idList": ["USN-3320-1", "USN-3699-1"], "type": "ubuntu"}, {"idList": ["7764B219-8148-11E8-AA4D-000E0CD7B374"], "type": "freebsd"}, {"idList": ["ELSA-2018-3229"], "type": "oraclelinux"}, {"idList": ["EULEROS_SA-2018-1397.NASL", "OPENSUSE-2017-554.NASL", "FREEBSD_PKG_7764B219814811E8AA4D000E0CD7B374.NASL", "SUSE_SU-2017-1095-1.NASL", "AL2_ALAS-2019-1142.NASL", "FEDORA_2018-237E9B550C.NASL", "DEBIAN_DLA-994.NASL", "UBUNTU_USN-3320-1.NASL", "CENTOS_RHSA-2018-3229.NASL", "DEBIAN_DSA-3878.NASL"], "type": "nessus"}, {"idList": ["CVE-2017-5974", "CVE-2018-7726", "CVE-2018-6541", "CVE-2017-5979", "CVE-2017-5976", "CVE-2017-5975", "CVE-2017-5981", "CVE-2017-5980", "CVE-2018-7727", "CVE-2017-5978"], "type": "cve"}, {"idList": ["OPENVAS:1361412562310875060", "OPENVAS:703878", "OPENVAS:1361412562310843579", "OPENVAS:1361412562310843208", "OPENVAS:1361412562310703878", "OPENVAS:1361412562310890994"], "type": "openvas"}]}, "score": {"modified": "2019-03-18T14:23:53", "value": 5.2, "vector": "NONE"}}, "hash": "e7336d0d43d9bc12a3592b4cb472472aa594a33172e64cd284941d9dbd373a41", "hashmap": [{"hash": "e5d6f39c28c0da0fb105a00f9435a31d", "key": "cvelist"}, {"hash": "1693b96dcccf4fbcd463bf8baaa2bf3f", "key": "description"}, {"hash": "45d8d4bf979ceecbb955d28e51b648de", "key": "href"}, {"hash": "dd542e9b4adf5f7b50b5f6a912ddd33d", "key": "references"}, {"hash": "21d85ac356942e38bedd62956a962b5a", "key": "published"}, {"hash": "3873c836ae45fd496c2b40bae50467ed", "key": "cvss"}, {"hash": "a1abfd5c17ae01e209e7e7f527231f74", "key": "title"}, {"hash": "3ceeabb263712f7d5c8c2844bfcc2aac", "key": "sourceData"}, {"hash": "bd2811809d78a66b4d39bc1fb8b08ee6", "key": "reporter"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "4525bc09d1c4c408a417a5eb7b850972", "key": "modified"}, {"hash": "2b66fa153f2147be69e6aa4fa233d1ba", "key": "pluginID"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874880", "id": "OPENVAS:1361412562310874880", "lastseen": "2019-03-18T14:23:53", "modified": "2019-03-15T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "1361412562310874880", "published": "2018-08-02T00:00:00", "references": ["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6J523IVLVVPUEHRDYT54A5QOKM5XVTO", "2018-237e9b550c"], "reporter": "Copyright (C) 2018 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_237e9b550c_zziplib_fc28.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for zziplib FEDORA-2018-237e9b550c\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874880\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-02 06:04:25 +0200 (Thu, 02 Aug 2018)\");\n script_cve_id(\"CVE-2018-6541\", \"CVE-2018-7727\", \"CVE-2017-5974\", \"CVE-2017-5975\",\n \"CVE-2017-5976\", \"CVE-2017-5977\", \"CVE-2017-5978\", \"CVE-2017-5979\",\n \"CVE-2017-5980\", \"CVE-2017-5981\", \"CVE-2018-7726\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for zziplib FEDORA-2018-237e9b550c\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'zziplib'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\non the target host.\");\n script_tag(name:\"affected\", value:\"zziplib on Fedora 28\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-237e9b550c\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6J523IVLVVPUEHRDYT54A5QOKM5XVTO\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"zziplib\", rpm:\"zziplib~0.13.69~1.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "title": "Fedora Update for zziplib FEDORA-2018-237e9b550c", "type": "openvas", "viewCount": 8}, "differentElements": ["cvss"], "edition": 4, "lastseen": "2019-03-18T14:23:53"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2017-5974", "CVE-2018-7726", "CVE-2018-6541", "CVE-2017-5979", "CVE-2017-5976", "CVE-2017-5975", "CVE-2017-5981", "CVE-2017-5980", "CVE-2018-7727", "CVE-2017-5978", "CVE-2017-5977"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Check the version of zziplib", "edition": 2, "enchantments": {"score": {"modified": "2018-08-30T19:17:17", "value": 7.5, "vector": "NONE"}}, "hash": "e7a9d1c8289a91f86f79d12ad962f29bc8dc167346b39ecdf242582135994307", "hashmap": [{"hash": "e5d6f39c28c0da0fb105a00f9435a31d", "key": "cvelist"}, {"hash": "481159014dafc38e1494396784a0d747", "key": "sourceData"}, {"hash": "45d8d4bf979ceecbb955d28e51b648de", "key": "href"}, {"hash": "dd542e9b4adf5f7b50b5f6a912ddd33d", "key": "references"}, {"hash": "06d31ea75ce174bd6e8a2331e24a21c2", "key": "modified"}, {"hash": "21d85ac356942e38bedd62956a962b5a", "key": "published"}, {"hash": "a1abfd5c17ae01e209e7e7f527231f74", "key": "title"}, {"hash": "bd2811809d78a66b4d39bc1fb8b08ee6", "key": "reporter"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "2b66fa153f2147be69e6aa4fa233d1ba", "key": "pluginID"}, {"hash": "274060f34213e5a1c533dc6f0eb11232", "key": "description"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874880", "id": "OPENVAS:1361412562310874880", "lastseen": "2018-08-30T19:17:17", "modified": "2018-08-06T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "1361412562310874880", "published": "2018-08-02T00:00:00", "references": ["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6J523IVLVVPUEHRDYT54A5QOKM5XVTO", "2018-237e9b550c"], "reporter": "Copyright (C) 2018 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_237e9b550c_zziplib_fc28.nasl 10778 2018-08-06 02:57:15Z ckuersteiner $\n#\n# Fedora Update for zziplib FEDORA-2018-237e9b550c\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874880\");\n script_version(\"$Revision: 10778 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-08-06 04:57:15 +0200 (Mon, 06 Aug 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-02 06:04:25 +0200 (Thu, 02 Aug 2018)\");\n script_cve_id(\"CVE-2018-6541\", \"CVE-2018-7727\", \"CVE-2017-5974\", \"CVE-2017-5975\", \n \"CVE-2017-5976\", \"CVE-2017-5977\", \"CVE-2017-5978\", \"CVE-2017-5979\", \n \"CVE-2017-5980\", \"CVE-2017-5981\", \"CVE-2018-7726\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for zziplib FEDORA-2018-237e9b550c\");\n script_tag(name:\"summary\", value:\"Check the version of zziplib\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present \non the target host.\");\n script_tag(name:\"insight\", value:\"The zziplib library is intentionally lightweight, \nit offers the ability to easily extract data from files archived in a single zip \nfile. Applications can bundle files into a single zip archive and access them. \nThe implementation is based only on the (free) subset of compression with the zlib \nalgorithm which is actually used by the zip/unzip tools.\n\");\n script_tag(name:\"affected\", value:\"zziplib on Fedora 28\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-237e9b550c\");\n script_xref(name:\"URL\" , value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6J523IVLVVPUEHRDYT54A5QOKM5XVTO\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"zziplib\", rpm:\"zziplib~0.13.69~1.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "title": "Fedora Update for zziplib FEDORA-2018-237e9b550c", "type": "openvas", "viewCount": 0}, "differentElements": ["cvss"], "edition": 2, "lastseen": "2018-08-30T19:17:17"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2017-5974", "CVE-2018-7726", "CVE-2018-6541", "CVE-2017-5979", "CVE-2017-5976", "CVE-2017-5975", "CVE-2017-5981", "CVE-2017-5980", "CVE-2018-7727", "CVE-2017-5978", "CVE-2017-5977"], "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "Check the version of zziplib", "edition": 3, "enchantments": {"dependencies": {"modified": "2018-09-01T23:37:24", "references": [{"idList": ["RHSA-2018:3229"], "type": "redhat"}, {"idList": ["DEBIAN:DLA-994-1:44807", "DEBIAN:DSA-3878-1:9871A"], "type": "debian"}, {"idList": ["USN-3320-1", "USN-3699-1"], "type": "ubuntu"}, {"idList": ["7764B219-8148-11E8-AA4D-000E0CD7B374"], "type": "freebsd"}, {"idList": ["ELSA-2018-3229"], "type": "oraclelinux"}, {"idList": ["EULEROS_SA-2018-1397.NASL", "OPENSUSE-2017-554.NASL", "FREEBSD_PKG_7764B219814811E8AA4D000E0CD7B374.NASL", "SUSE_SU-2017-1095-1.NASL", "AL2_ALAS-2019-1142.NASL", "FEDORA_2018-237E9B550C.NASL", "DEBIAN_DLA-994.NASL", "UBUNTU_USN-3320-1.NASL", "CENTOS_RHSA-2018-3229.NASL", "DEBIAN_DSA-3878.NASL"], "type": "nessus"}, {"idList": ["CVE-2017-5974", "CVE-2018-7726", "CVE-2018-6541", "CVE-2017-5979", "CVE-2017-5976", "CVE-2017-5975", "CVE-2017-5981", "CVE-2017-5980", "CVE-2018-7727", "CVE-2017-5978"], "type": "cve"}, {"idList": ["OPENVAS:1361412562310875060", "OPENVAS:703878", "OPENVAS:1361412562310843579", "OPENVAS:1361412562310843208", "OPENVAS:1361412562310703878", "OPENVAS:1361412562310890994"], "type": "openvas"}]}, "score": {"modified": "2018-09-01T23:37:24", "value": 7.5, "vector": "NONE"}}, "hash": "ae63ad10640f1c9c4c23fb4d3d995e30c0e0fb3922aa485327863a89c41d5cfd", "hashmap": [{"hash": "e5d6f39c28c0da0fb105a00f9435a31d", "key": "cvelist"}, {"hash": "481159014dafc38e1494396784a0d747", "key": "sourceData"}, {"hash": "45d8d4bf979ceecbb955d28e51b648de", "key": "href"}, {"hash": "dd542e9b4adf5f7b50b5f6a912ddd33d", "key": "references"}, {"hash": "06d31ea75ce174bd6e8a2331e24a21c2", "key": "modified"}, {"hash": "21d85ac356942e38bedd62956a962b5a", "key": "published"}, {"hash": "3873c836ae45fd496c2b40bae50467ed", "key": "cvss"}, {"hash": "a1abfd5c17ae01e209e7e7f527231f74", "key": "title"}, {"hash": "bd2811809d78a66b4d39bc1fb8b08ee6", "key": "reporter"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "2b66fa153f2147be69e6aa4fa233d1ba", "key": "pluginID"}, {"hash": "274060f34213e5a1c533dc6f0eb11232", "key": "description"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874880", "id": "OPENVAS:1361412562310874880", "lastseen": "2018-09-01T23:37:24", "modified": "2018-08-06T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "1361412562310874880", "published": "2018-08-02T00:00:00", "references": ["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6J523IVLVVPUEHRDYT54A5QOKM5XVTO", "2018-237e9b550c"], "reporter": "Copyright (C) 2018 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_237e9b550c_zziplib_fc28.nasl 10778 2018-08-06 02:57:15Z ckuersteiner $\n#\n# Fedora Update for zziplib FEDORA-2018-237e9b550c\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874880\");\n script_version(\"$Revision: 10778 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-08-06 04:57:15 +0200 (Mon, 06 Aug 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-02 06:04:25 +0200 (Thu, 02 Aug 2018)\");\n script_cve_id(\"CVE-2018-6541\", \"CVE-2018-7727\", \"CVE-2017-5974\", \"CVE-2017-5975\", \n \"CVE-2017-5976\", \"CVE-2017-5977\", \"CVE-2017-5978\", \"CVE-2017-5979\", \n \"CVE-2017-5980\", \"CVE-2017-5981\", \"CVE-2018-7726\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for zziplib FEDORA-2018-237e9b550c\");\n script_tag(name:\"summary\", value:\"Check the version of zziplib\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present \non the target host.\");\n script_tag(name:\"insight\", value:\"The zziplib library is intentionally lightweight, \nit offers the ability to easily extract data from files archived in a single zip \nfile. Applications can bundle files into a single zip archive and access them. \nThe implementation is based only on the (free) subset of compression with the zlib \nalgorithm which is actually used by the zip/unzip tools.\n\");\n script_tag(name:\"affected\", value:\"zziplib on Fedora 28\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-237e9b550c\");\n script_xref(name:\"URL\" , value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6J523IVLVVPUEHRDYT54A5QOKM5XVTO\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"zziplib\", rpm:\"zziplib~0.13.69~1.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "title": "Fedora Update for zziplib FEDORA-2018-237e9b550c", "type": "openvas", "viewCount": 8}, "differentElements": ["description", "modified", "sourceData"], "edition": 3, "lastseen": "2018-09-01T23:37:24"}], "edition": 5, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cvelist", "hash": "e5d6f39c28c0da0fb105a00f9435a31d"}, {"key": "cvss", "hash": "741b18e744e3f37108cd8c3f4a1c6ef7"}, {"key": "description", "hash": "1693b96dcccf4fbcd463bf8baaa2bf3f"}, {"key": "href", "hash": "45d8d4bf979ceecbb955d28e51b648de"}, {"key": "modified", "hash": "4525bc09d1c4c408a417a5eb7b850972"}, {"key": "naslFamily", "hash": "be931514784f88df80712740ad2723e7"}, {"key": "pluginID", "hash": "2b66fa153f2147be69e6aa4fa233d1ba"}, {"key": "published", "hash": "21d85ac356942e38bedd62956a962b5a"}, {"key": "references", "hash": "dd542e9b4adf5f7b50b5f6a912ddd33d"}, {"key": "reporter", "hash": "bd2811809d78a66b4d39bc1fb8b08ee6"}, {"key": "sourceData", "hash": "3ceeabb263712f7d5c8c2844bfcc2aac"}, {"key": "title", "hash": "a1abfd5c17ae01e209e7e7f527231f74"}, {"key": "type", "hash": "47c1f692ea47a21f716dad07043ade01"}], "hash": "7a163f4f01d42cf82091e8a521d5d3c27bfb4047260602fb396b58ecb115fcdd", "viewCount": 8, "enchantments": {"dependencies": {"references": [{"type": "nessus", "idList": ["SUSE_SU-2017-1095-1.NASL", "OPENSUSE-2017-554.NASL", "DEBIAN_DLA-994.NASL", "DEBIAN_DSA-3878.NASL", "UBUNTU_USN-3320-1.NASL", "FREEBSD_PKG_7764B219814811E8AA4D000E0CD7B374.NASL", "FEDORA_2018-237E9B550C.NASL", "EULEROS_SA-2019-2236.NASL", "CENTOS_RHSA-2018-3229.NASL", "ORACLELINUX_ELSA-2018-3229.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310703878", "OPENVAS:1361412562310843208", "OPENVAS:703878", "OPENVAS:1361412562310890994", "OPENVAS:1361412562310875060", "OPENVAS:1361412562310843579"]}, {"type": "ubuntu", "idList": ["USN-3320-1", "USN-3699-1"]}, {"type": "debian", "idList": ["DEBIAN:DLA-994-1:44807", "DEBIAN:DSA-3878-1:9871A"]}, {"type": "freebsd", "idList": ["7764B219-8148-11E8-AA4D-000E0CD7B374"]}, {"type": "cve", "idList": ["CVE-2017-5981", "CVE-2017-5979", "CVE-2018-7727", "CVE-2017-5975", "CVE-2017-5980", "CVE-2018-7726", "CVE-2017-5976", "CVE-2017-5977", "CVE-2017-5978", "CVE-2017-5974"]}, {"type": "centos", "idList": ["CESA-2018:3229", "CESA-2019:2196"]}, {"type": "oraclelinux", "idList": ["ELSA-2018-3229", "ELSA-2019-2196"]}, {"type": "redhat", "idList": ["RHSA-2018:3229", "RHSA-2019:2196"]}], "modified": "2019-05-29T18:33:07"}, "score": {"value": 6.5, "vector": "NONE", "modified": "2019-05-29T18:33:07"}, "vulnersScore": 6.5}, "objectVersion": "1.3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_237e9b550c_zziplib_fc28.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for zziplib FEDORA-2018-237e9b550c\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874880\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-02 06:04:25 +0200 (Thu, 02 Aug 2018)\");\n script_cve_id(\"CVE-2018-6541\", \"CVE-2018-7727\", \"CVE-2017-5974\", \"CVE-2017-5975\",\n \"CVE-2017-5976\", \"CVE-2017-5977\", \"CVE-2017-5978\", \"CVE-2017-5979\",\n \"CVE-2017-5980\", \"CVE-2017-5981\", \"CVE-2018-7726\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for zziplib FEDORA-2018-237e9b550c\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'zziplib'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\non the target host.\");\n script_tag(name:\"affected\", value:\"zziplib on Fedora 28\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-237e9b550c\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6J523IVLVVPUEHRDYT54A5QOKM5XVTO\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"zziplib\", rpm:\"zziplib~0.13.69~1.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "naslFamily": "Fedora Local Security Checks", "pluginID": "1361412562310874880", "scheme": null}
{"nessus": [{"lastseen": "2019-12-13T09:22:46", "bulletinFamily": "scanner", "description": "This update for zziplib fixes the following issues: Secuirty issues\nfixed :\n\n - CVE-2017-5974: heap-based buffer overflow in\n __zzip_get32 (fetch.c) (bsc#1024517)\n\n - CVE-2017-5975: heap-based buffer overflow in\n __zzip_get64 (fetch.c) (bsc#1024528)\n\n - CVE-2017-5976: heap-based buffer overflow in\n zzip_mem_entry_extra_block (memdisk.c) (bsc#1024531)\n\n - CVE-2017-5977: invalid memory read in\n zzip_mem_entry_extra_block (memdisk.c) (bsc#1024534)\n\n - CVE-2017-5978: out of bounds read in zzip_mem_entry_new\n (memdisk.c) (bsc#1024533)\n\n - CVE-2017-5979: NULL pointer dereference in prescan_entry\n (fseeko.c) (bsc#1024535)\n\n - CVE-2017-5980: NULL pointer dereference in\n zzip_mem_entry_new (memdisk.c) (bsc#1024536)\n\n - CVE-2017-5981: assertion failure in seeko.c\n (bsc#1024539)\n\n - NULL pointer dereference in main (unzzipcat-mem.c)\n (bsc#1024532)\n\n - NULL pointer dereference in main (unzzipcat.c)\n (bsc#1024537)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-12-02T00:00:00", "id": "SUSE_SU-2017-1095-1.NASL", "href": "https://www.tenable.com/plugins/nessus/99653", "published": "2017-04-25T00:00:00", "title": "SUSE SLED12 Security Update : zziplib (SUSE-SU-2017:1095-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2017:1095-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(99653);\n script_version(\"3.7\");\n script_cvs_date(\"Date: 2019/09/11 11:22:15\");\n\n script_cve_id(\"CVE-2017-5974\", \"CVE-2017-5975\", \"CVE-2017-5976\", \"CVE-2017-5977\", \"CVE-2017-5978\", \"CVE-2017-5979\", \"CVE-2017-5980\", \"CVE-2017-5981\");\n\n script_name(english:\"SUSE SLED12 Security Update : zziplib (SUSE-SU-2017:1095-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for zziplib fixes the following issues: Secuirty issues\nfixed :\n\n - CVE-2017-5974: heap-based buffer overflow in\n __zzip_get32 (fetch.c) (bsc#1024517)\n\n - CVE-2017-5975: heap-based buffer overflow in\n __zzip_get64 (fetch.c) (bsc#1024528)\n\n - CVE-2017-5976: heap-based buffer overflow in\n zzip_mem_entry_extra_block (memdisk.c) (bsc#1024531)\n\n - CVE-2017-5977: invalid memory read in\n zzip_mem_entry_extra_block (memdisk.c) (bsc#1024534)\n\n - CVE-2017-5978: out of bounds read in zzip_mem_entry_new\n (memdisk.c) (bsc#1024533)\n\n - CVE-2017-5979: NULL pointer dereference in prescan_entry\n (fseeko.c) (bsc#1024535)\n\n - CVE-2017-5980: NULL pointer dereference in\n zzip_mem_entry_new (memdisk.c) (bsc#1024536)\n\n - CVE-2017-5981: assertion failure in seeko.c\n (bsc#1024539)\n\n - NULL pointer dereference in main (unzzipcat-mem.c)\n (bsc#1024532)\n\n - NULL pointer dereference in main (unzzipcat.c)\n (bsc#1024537)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1024517\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1024528\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1024531\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1024532\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1024533\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1024534\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1024535\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1024536\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1024537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1024539\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-5974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-5975/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-5976/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-5977/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-5978/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-5979/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-5980/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-5981/\"\n );\n # https://www.suse.com/support/update/announcement/2017/suse-su-20171095-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e5ebf2dd\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 12-SP2:zypper in -t patch\nSUSE-SLE-WE-12-SP2-2017-638=1\n\nSUSE Linux Enterprise Workstation Extension 12-SP1:zypper in -t patch\nSUSE-SLE-WE-12-SP1-2017-638=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP2:zypper in -t\npatch SUSE-SLE-SDK-12-SP2-2017-638=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP1:zypper in -t\npatch SUSE-SLE-SDK-12-SP1-2017-638=1\n\nSUSE Linux Enterprise Desktop 12-SP2:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP2-2017-638=1\n\nSUSE Linux Enterprise Desktop 12-SP1:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP1-2017-638=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libzzip-0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libzzip-0-13-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:zziplib-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(1|2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP1/2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"libzzip-0-13-0.13.62-9.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"libzzip-0-13-debuginfo-0.13.62-9.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"zziplib-debugsource-0.13.62-9.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libzzip-0-13-0.13.62-9.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libzzip-0-13-debuginfo-0.13.62-9.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"zziplib-debugsource-0.13.62-9.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"zziplib\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-12-13T08:18:25", "bulletinFamily": "scanner", "description": "This update for zziplib fixes the following issues :\n\nSecuirty issues fixed :\n\n - CVE-2017-5974: heap-based buffer overflow in\n __zzip_get32 (fetch.c) (bsc#1024517)\n\n - CVE-2017-5975: heap-based buffer overflow in\n __zzip_get64 (fetch.c) (bsc#1024528)\n\n - CVE-2017-5976: heap-based buffer overflow in\n zzip_mem_entry_extra_block (memdisk.c) (bsc#1024531)\n\n - CVE-2017-5977: invalid memory read in\n zzip_mem_entry_extra_block (memdisk.c) (bsc#1024534)\n\n - CVE-2017-5978: out of bounds read in zzip_mem_entry_new\n (memdisk.c) (bsc#1024533)\n\n - CVE-2017-5979: NULL pointer dereference in prescan_entry\n (fseeko.c) (bsc#1024535)\n\n - CVE-2017-5980: NULL pointer dereference in\n zzip_mem_entry_new (memdisk.c) (bsc#1024536)\n\n - CVE-2017-5981: assertion failure in seeko.c\n (bsc#1024539)\n\n - NULL pointer dereference in main (unzzipcat-mem.c)\n (bsc#1024532)\n\n - NULL pointer dereference in main (unzzipcat.c)\n (bsc#1024537)\n\nThis update was imported from the SUSE:SLE-12:Update update project.", "modified": "2019-12-02T00:00:00", "id": "OPENSUSE-2017-554.NASL", "href": "https://www.tenable.com/plugins/nessus/100038", "published": "2017-05-09T00:00:00", "title": "openSUSE Security Update : zziplib (openSUSE-2017-554)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2017-554.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100038);\n script_version(\"$Revision: 3.2 $\");\n script_cvs_date(\"$Date: 2018/01/26 17:32:52 $\");\n\n script_cve_id(\"CVE-2017-5974\", \"CVE-2017-5975\", \"CVE-2017-5976\", \"CVE-2017-5977\", \"CVE-2017-5978\", \"CVE-2017-5979\", \"CVE-2017-5980\", \"CVE-2017-5981\");\n\n script_name(english:\"openSUSE Security Update : zziplib (openSUSE-2017-554)\");\n script_summary(english:\"Check for the openSUSE-2017-554 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for zziplib fixes the following issues :\n\nSecuirty issues fixed :\n\n - CVE-2017-5974: heap-based buffer overflow in\n __zzip_get32 (fetch.c) (bsc#1024517)\n\n - CVE-2017-5975: heap-based buffer overflow in\n __zzip_get64 (fetch.c) (bsc#1024528)\n\n - CVE-2017-5976: heap-based buffer overflow in\n zzip_mem_entry_extra_block (memdisk.c) (bsc#1024531)\n\n - CVE-2017-5977: invalid memory read in\n zzip_mem_entry_extra_block (memdisk.c) (bsc#1024534)\n\n - CVE-2017-5978: out of bounds read in zzip_mem_entry_new\n (memdisk.c) (bsc#1024533)\n\n - CVE-2017-5979: NULL pointer dereference in prescan_entry\n (fseeko.c) (bsc#1024535)\n\n - CVE-2017-5980: NULL pointer dereference in\n zzip_mem_entry_new (memdisk.c) (bsc#1024536)\n\n - CVE-2017-5981: assertion failure in seeko.c\n (bsc#1024539)\n\n - NULL pointer dereference in main (unzzipcat-mem.c)\n (bsc#1024532)\n\n - NULL pointer dereference in main (unzzipcat.c)\n (bsc#1024537)\n\nThis update was imported from the SUSE:SLE-12:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1024517\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1024528\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1024531\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1024532\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1024533\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1024534\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1024535\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1024536\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1024537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1024539\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected zziplib packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libzzip-0-13\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libzzip-0-13-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libzzip-0-13-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libzzip-0-13-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:zziplib-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:zziplib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:zziplib-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:zziplib-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:zziplib-devel-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.1|SUSE42\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.1 / 42.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libzzip-0-13-0.13.62-10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libzzip-0-13-debuginfo-0.13.62-10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"zziplib-debugsource-0.13.62-10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"zziplib-devel-0.13.62-10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"zziplib-devel-debuginfo-0.13.62-10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libzzip-0-13-32bit-0.13.62-10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libzzip-0-13-debuginfo-32bit-0.13.62-10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"zziplib-devel-32bit-0.13.62-10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"zziplib-devel-debuginfo-32bit-0.13.62-10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"libzzip-0-13-0.13.62-10.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"libzzip-0-13-debuginfo-0.13.62-10.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"zziplib-debugsource-0.13.62-10.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"zziplib-devel-0.13.62-10.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"zziplib-devel-debuginfo-0.13.62-10.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", cpu:\"x86_64\", reference:\"libzzip-0-13-32bit-0.13.62-10.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", cpu:\"x86_64\", reference:\"libzzip-0-13-debuginfo-32bit-0.13.62-10.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", cpu:\"x86_64\", reference:\"zziplib-devel-32bit-0.13.62-10.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", cpu:\"x86_64\", reference:\"zziplib-devel-debuginfo-32bit-0.13.62-10.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libzzip-0-13 / libzzip-0-13-32bit / libzzip-0-13-debuginfo / etc\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-12-13T09:46:05", "bulletinFamily": "scanner", "description": "Agostino Sarubbo discovered that zziplib incorrectly handled certain\nmalformed ZIP files. If a user or automated system were tricked into\nopening a specially crafted ZIP file, a remote attacker could cause\nzziplib to crash, resulting in a denial of service, or possibly\nexecute arbitrary code.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-12-02T00:00:00", "id": "UBUNTU_USN-3320-1.NASL", "href": "https://www.tenable.com/plugins/nessus/100837", "published": "2017-06-16T00:00:00", "title": "Ubuntu 14.04 LTS / 16.04 LTS / 16.10 / 17.04 : zziplib vulnerabilities (USN-3320-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3320-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100837);\n script_version(\"3.7\");\n script_cvs_date(\"Date: 2019/09/18 12:31:47\");\n\n script_cve_id(\"CVE-2017-5974\", \"CVE-2017-5975\", \"CVE-2017-5976\", \"CVE-2017-5978\", \"CVE-2017-5979\", \"CVE-2017-5980\", \"CVE-2017-5981\");\n script_xref(name:\"USN\", value:\"3320-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 16.04 LTS / 16.10 / 17.04 : zziplib vulnerabilities (USN-3320-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Agostino Sarubbo discovered that zziplib incorrectly handled certain\nmalformed ZIP files. If a user or automated system were tricked into\nopening a specially crafted ZIP file, a remote attacker could cause\nzziplib to crash, resulting in a denial of service, or possibly\nexecute arbitrary code.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3320-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libzzip-0-13 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libzzip-0-13\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|16\\.04|16\\.10|17\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 16.04 / 16.10 / 17.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"libzzip-0-13\", pkgver:\"0.13.62-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libzzip-0-13\", pkgver:\"0.13.62-3ubuntu0.16.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.10\", pkgname:\"libzzip-0-13\", pkgver:\"0.13.62-3ubuntu0.16.10.1\")) flag++;\nif (ubuntu_check(osver:\"17.04\", pkgname:\"libzzip-0-13\", pkgver:\"0.13.62-3ubuntu0.17.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libzzip-0-13\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-12-13T06:50:54", "bulletinFamily": "scanner", "description": "CVE-2017-5974 Heap-based buffer overflow in the __zzip_get32 function\nin fetch.c in zziplib allows remote attackers to cause a denial of\nservice (crash) via a crafted ZIP file.\n\nCVE-2017-5975 Heap-based buffer overflow in the __zzip_get64 function\nin fetch.c in zziplib allows remote attackers to cause a denial of\nservice (crash) via a crafted ZIP file.\n\nCVE-2017-5976 Heap-based buffer overflow in the\nzzip_mem_entry_extra_block function in memdisk.c in zziplib allows\nremote attackers to cause a denial of service (crash) via a crafted\nZIP file.\n\nCVE-2017-5978 The zzip_mem_entry_new function in memdisk.c in zziplib\nallows remote attackers to cause a denial of service (out-of-bounds\nread and crash) via a crafted ZIP file.\n\nCVE-2017-5979 The prescan_entry function in fseeko.c in zziplib allows\nremote attackers to cause a denial of service (NULL pointer\ndereference and crash) via a crafted ZIP file.\n\nCVE-2017-5980 The zzip_mem_entry_new function in memdisk.c in zziplib\nallows remote attackers to cause a denial of service (NULL pointer\ndereference and crash) via a crafted ZIP file.\n\nCVE-2017-5981 seeko.c in zziplib allows remote attackers to cause a\ndenial of service (assertion failure and crash) via a crafted ZIP\nfile.\n\nFor Debian 7 ", "modified": "2019-12-02T00:00:00", "id": "DEBIAN_DLA-994.NASL", "href": "https://www.tenable.com/plugins/nessus/100939", "published": "2017-06-21T00:00:00", "title": "Debian DLA-994-1 : zziplib security update", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-994-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100939);\n script_version(\"3.4\");\n script_cvs_date(\"Date: 2018/07/10 12:45:04\");\n\n script_cve_id(\"CVE-2017-5974\", \"CVE-2017-5975\", \"CVE-2017-5976\", \"CVE-2017-5978\", \"CVE-2017-5979\", \"CVE-2017-5980\", \"CVE-2017-5981\");\n\n script_name(english:\"Debian DLA-994-1 : zziplib security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"CVE-2017-5974 Heap-based buffer overflow in the __zzip_get32 function\nin fetch.c in zziplib allows remote attackers to cause a denial of\nservice (crash) via a crafted ZIP file.\n\nCVE-2017-5975 Heap-based buffer overflow in the __zzip_get64 function\nin fetch.c in zziplib allows remote attackers to cause a denial of\nservice (crash) via a crafted ZIP file.\n\nCVE-2017-5976 Heap-based buffer overflow in the\nzzip_mem_entry_extra_block function in memdisk.c in zziplib allows\nremote attackers to cause a denial of service (crash) via a crafted\nZIP file.\n\nCVE-2017-5978 The zzip_mem_entry_new function in memdisk.c in zziplib\nallows remote attackers to cause a denial of service (out-of-bounds\nread and crash) via a crafted ZIP file.\n\nCVE-2017-5979 The prescan_entry function in fseeko.c in zziplib allows\nremote attackers to cause a denial of service (NULL pointer\ndereference and crash) via a crafted ZIP file.\n\nCVE-2017-5980 The zzip_mem_entry_new function in memdisk.c in zziplib\nallows remote attackers to cause a denial of service (NULL pointer\ndereference and crash) via a crafted ZIP file.\n\nCVE-2017-5981 seeko.c in zziplib allows remote attackers to cause a\ndenial of service (assertion failure and crash) via a crafted ZIP\nfile.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n0.13.56-1.1+deb7u1.\n\nWe recommend that you upgrade your zziplib packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2017/06/msg00023.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/zziplib\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libzzip-0-13\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libzzip-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:zziplib-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libzzip-0-13\", reference:\"0.13.56-1.1+deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libzzip-dev\", reference:\"0.13.56-1.1+deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"zziplib-bin\", reference:\"0.13.56-1.1+deb7u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-12-13T06:51:51", "bulletinFamily": "scanner", "description": "Agostino Sarubbo discovered multiple vulnerabilities in zziplib, a\nlibrary to access Zip archives, which could result in denial of\nservice and potentially the execution of arbitrary code if a malformed\narchive is processed.", "modified": "2019-12-02T00:00:00", "id": "DEBIAN_DSA-3878.NASL", "href": "https://www.tenable.com/plugins/nessus/100739", "published": "2017-06-13T00:00:00", "title": "Debian DSA-3878-1 : zziplib - security update", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3878. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100739);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2018/11/10 11:49:38\");\n\n script_cve_id(\"CVE-2017-5974\", \"CVE-2017-5975\", \"CVE-2017-5976\", \"CVE-2017-5978\", \"CVE-2017-5979\", \"CVE-2017-5980\", \"CVE-2017-5981\");\n script_xref(name:\"DSA\", value:\"3878\");\n\n script_name(english:\"Debian DSA-3878-1 : zziplib - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Agostino Sarubbo discovered multiple vulnerabilities in zziplib, a\nlibrary to access Zip archives, which could result in denial of\nservice and potentially the execution of arbitrary code if a malformed\narchive is processed.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/zziplib\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2017/dsa-3878\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the zziplib packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 0.13.62-3+deb8u1.\n\nFor the upcoming stable distribution (stretch), these problems have\nbeen fixed in version 0.13.62-3.1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:zziplib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libzzip-0-13\", reference:\"0.13.62-3+deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libzzip-dev\", reference:\"0.13.62-3+deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"zziplib-bin\", reference:\"0.13.62-3+deb8u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-12-13T06:30:51", "bulletinFamily": "scanner", "description": "According to the versions of the zziplib package installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - The zziplib is a lightweight library to easily extract\n data from zip files.Security Fix(es):An issue was\n discovered in ZZIPlib through 0.13.69. There is a\n memory leak triggered in the function\n __zzip_parse_root_directory in zip.c, which will lead\n to a denial of service attack.(CVE-2018-16548)In\n ZZIPlib 0.13.67, there is a segmentation fault caused\n by invalid memory access in the zzip_disk_fread\n function (zzip/mmapped.c) because the size variable is\n not validated against the amount of file->stored\n data.(CVE-2018-6381)In ZZIPlib 0.13.67, there is a\n memory alignment error and bus error in the\n __zzip_fetch_disk_trailer function of zzip/zip.c.\n Remote attackers could leverage this vulnerability to\n cause a denial of service via a crafted zip\n file.(CVE-2018-6484)In ZZIPlib 0.13.67, there is a bus\n error caused by loading of a misaligned address in the\n zzip_disk_findfirst function of zzip/mmapped.c. Remote\n attackers could leverage this vulnerability to cause a\n denial of service via a crafted zip\n file.(CVE-2018-6540)In ZZIPlib 0.13.67, there is a bus\n error caused by loading of a misaligned address (when\n handling disk64_trailer local entries) in\n __zzip_fetch_disk_trailer (zzip/zip.c). Remote\n attackers could leverage this vulnerability to cause a\n denial of service via a crafted zip\n file.(CVE-2018-6541)In ZZIPlib 0.13.68, there is an\n uncontrolled memory allocation and a crash in the\n __zzip_parse_root_directory function of zzip/zip.c.\n Remote attackers could leverage this vulnerability to\n cause a denial of service via a crafted zip\n file.(CVE-2018-6869)The prescan_entry function in\n fseeko.c in zziplib 0.13.62 allows remote attackers to\n cause a denial of service (NULL pointer dereference and\n crash) via a crafted ZIP file.(CVE-2017-5979)seeko.c in\n zziplib 0.13.62 allows remote attackers to cause a\n denial of service (assertion failure and crash) via a\n crafted ZIP file.(CVE-2017-5981)The zzip_mem_entry_new\n function in memdisk.c in zziplib 0.13.62 allows remote\n attackers to cause a denial of service (out-of-bounds\n read and crash) via a crafted ZIP\n file.(CVE-2017-5978)Heap-based buffer overflow in the\n __zzip_get32 function in fetch.c in zziplib 0.13.62\n allows remote attackers to cause a denial of service\n (crash) via a crafted ZIP\n file.(CVE-2017-5974)Heap-based buffer overflow in the\n zzip_mem_entry_extra_block function in memdisk.c in\n zziplib 0.13.62 allows remote attackers to cause a\n denial of service (crash) via a crafted ZIP\n file.(CVE-2017-5976)Heap-based buffer overflow in the\n __zzip_get64 function in fetch.c in zziplib 0.13.62\n allows remote attackers to cause a denial of service\n (crash) via a crafted ZIP file.(CVE-2017-5975)The\n zzip_mem_entry_extra_block function in memdisk.c in\n zziplib 0.13.62 allows remote attackers to cause a\n denial of service (invalid memory read and crash) via a\n crafted ZIP file.(CVE-2017-5977)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-12-02T00:00:00", "published": "2019-12-04T00:00:00", "id": "EULEROS_SA-2019-2478.NASL", "href": "https://www.tenable.com/plugins/nessus/131631", "title": "EulerOS 2.0 SP2 : zziplib (EulerOS-SA-2019-2478)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131631);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2019/12/10\");\n\n script_cve_id(\n \"CVE-2017-5974\",\n \"CVE-2017-5975\",\n \"CVE-2017-5976\",\n \"CVE-2017-5977\",\n \"CVE-2017-5978\",\n \"CVE-2017-5979\",\n \"CVE-2017-5981\",\n \"CVE-2018-16548\",\n \"CVE-2018-6381\",\n \"CVE-2018-6484\",\n \"CVE-2018-6540\",\n \"CVE-2018-6541\",\n \"CVE-2018-6869\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : zziplib (EulerOS-SA-2019-2478)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the zziplib package installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - The zziplib is a lightweight library to easily extract\n data from zip files.Security Fix(es):An issue was\n discovered in ZZIPlib through 0.13.69. There is a\n memory leak triggered in the function\n __zzip_parse_root_directory in zip.c, which will lead\n to a denial of service attack.(CVE-2018-16548)In\n ZZIPlib 0.13.67, there is a segmentation fault caused\n by invalid memory access in the zzip_disk_fread\n function (zzip/mmapped.c) because the size variable is\n not validated against the amount of file->stored\n data.(CVE-2018-6381)In ZZIPlib 0.13.67, there is a\n memory alignment error and bus error in the\n __zzip_fetch_disk_trailer function of zzip/zip.c.\n Remote attackers could leverage this vulnerability to\n cause a denial of service via a crafted zip\n file.(CVE-2018-6484)In ZZIPlib 0.13.67, there is a bus\n error caused by loading of a misaligned address in the\n zzip_disk_findfirst function of zzip/mmapped.c. Remote\n attackers could leverage this vulnerability to cause a\n denial of service via a crafted zip\n file.(CVE-2018-6540)In ZZIPlib 0.13.67, there is a bus\n error caused by loading of a misaligned address (when\n handling disk64_trailer local entries) in\n __zzip_fetch_disk_trailer (zzip/zip.c). Remote\n attackers could leverage this vulnerability to cause a\n denial of service via a crafted zip\n file.(CVE-2018-6541)In ZZIPlib 0.13.68, there is an\n uncontrolled memory allocation and a crash in the\n __zzip_parse_root_directory function of zzip/zip.c.\n Remote attackers could leverage this vulnerability to\n cause a denial of service via a crafted zip\n file.(CVE-2018-6869)The prescan_entry function in\n fseeko.c in zziplib 0.13.62 allows remote attackers to\n cause a denial of service (NULL pointer dereference and\n crash) via a crafted ZIP file.(CVE-2017-5979)seeko.c in\n zziplib 0.13.62 allows remote attackers to cause a\n denial of service (assertion failure and crash) via a\n crafted ZIP file.(CVE-2017-5981)The zzip_mem_entry_new\n function in memdisk.c in zziplib 0.13.62 allows remote\n attackers to cause a denial of service (out-of-bounds\n read and crash) via a crafted ZIP\n file.(CVE-2017-5978)Heap-based buffer overflow in the\n __zzip_get32 function in fetch.c in zziplib 0.13.62\n allows remote attackers to cause a denial of service\n (crash) via a crafted ZIP\n file.(CVE-2017-5974)Heap-based buffer overflow in the\n zzip_mem_entry_extra_block function in memdisk.c in\n zziplib 0.13.62 allows remote attackers to cause a\n denial of service (crash) via a crafted ZIP\n file.(CVE-2017-5976)Heap-based buffer overflow in the\n __zzip_get64 function in fetch.c in zziplib 0.13.62\n allows remote attackers to cause a denial of service\n (crash) via a crafted ZIP file.(CVE-2017-5975)The\n zzip_mem_entry_extra_block function in memdisk.c in\n zziplib 0.13.62 allows remote attackers to cause a\n denial of service (invalid memory read and crash) via a\n crafted ZIP file.(CVE-2017-5977)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2478\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ae1e7e31\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected zziplib packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-6869\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:zziplib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\n\nflag = 0;\n\npkgs = [\"zziplib-0.13.62-9.h3\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"zziplib\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-12-13T07:30:24", "bulletinFamily": "scanner", "description": "NIST reports (by search in the range 2017/01/01 - 2018/07/06) :\n\n17 security fixes in this release :\n\n- Heap-based buffer overflow in the __zzip_get32 function in fetch.c.\n\n- Heap-based buffer overflow in the __zzip_get64 function in fetch.c.\n\n- Heap-based buffer overflow in the zzip_mem_entry_extra_block\nfunction in memdisk.c.\n\n- The zzip_mem_entry_new function in memdisk.c allows remote attackers\nto cause a denial of service (out-of-bounds read and crash) via a\ncrafted ZIP file.\n\n- The prescan_entry function in fseeko.c allows remote attackers to\ncause a denial of service (NULL pointer dereference and crash) via\ncrafted ZIP file.\n\n- The zzip_mem_entry_new function in memdisk.c cause a NULL pointer\ndereference and crash via a crafted ZIP file.\n\n- seeko.c cause a denial of service (assertion failure and crash) via\na crafted ZIP file.\n\n- A segmentation fault caused by invalid memory access in the\nzzip_disk_fread function because the size variable is not validated\nagainst the amount of file->stored data.\n\n- A memory alignment error and bus error in the\n__zzip_fetch_disk_trailer function of zzip/zip.c.\n\n- A bus error caused by loading of a misaligned address in the\nzzip_disk_findfirst function.\n\n- An uncontrolled memory allocation and a crash in the\n__zzip_parse_root_directory function.\n\n- An invalid memory address dereference was discovered in\nzzip_disk_fread in mmapped.c.\n\n- A memory leak triggered in the function zzip_mem_disk_new in\nmemdisk.c.", "modified": "2019-12-02T00:00:00", "id": "FREEBSD_PKG_7764B219814811E8AA4D000E0CD7B374.NASL", "href": "https://www.tenable.com/plugins/nessus/110969", "published": "2018-07-10T00:00:00", "title": "FreeBSD : zziplib - multiple vulnerabilities (7764b219-8148-11e8-aa4d-000e0cd7b374)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(110969);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2019/07/10 16:04:13\");\n\n script_cve_id(\"CVE-2017-5974\", \"CVE-2017-5975\", \"CVE-2017-5976\", \"CVE-2017-5977\", \"CVE-2017-5978\", \"CVE-2017-5979\", \"CVE-2017-5980\", \"CVE-2017-5981\", \"CVE-2018-6381\", \"CVE-2018-6484\", \"CVE-2018-6540\", \"CVE-2018-6541\", \"CVE-2018-6542\", \"CVE-2018-6869\", \"CVE-2018-7725\", \"CVE-2018-7726\", \"CVE-2018-7727\");\n\n script_name(english:\"FreeBSD : zziplib - multiple vulnerabilities (7764b219-8148-11e8-aa4d-000e0cd7b374)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"NIST reports (by search in the range 2017/01/01 - 2018/07/06) :\n\n17 security fixes in this release :\n\n- Heap-based buffer overflow in the __zzip_get32 function in fetch.c.\n\n- Heap-based buffer overflow in the __zzip_get64 function in fetch.c.\n\n- Heap-based buffer overflow in the zzip_mem_entry_extra_block\nfunction in memdisk.c.\n\n- The zzip_mem_entry_new function in memdisk.c allows remote attackers\nto cause a denial of service (out-of-bounds read and crash) via a\ncrafted ZIP file.\n\n- The prescan_entry function in fseeko.c allows remote attackers to\ncause a denial of service (NULL pointer dereference and crash) via\ncrafted ZIP file.\n\n- The zzip_mem_entry_new function in memdisk.c cause a NULL pointer\ndereference and crash via a crafted ZIP file.\n\n- seeko.c cause a denial of service (assertion failure and crash) via\na crafted ZIP file.\n\n- A segmentation fault caused by invalid memory access in the\nzzip_disk_fread function because the size variable is not validated\nagainst the amount of file->stored data.\n\n- A memory alignment error and bus error in the\n__zzip_fetch_disk_trailer function of zzip/zip.c.\n\n- A bus error caused by loading of a misaligned address in the\nzzip_disk_findfirst function.\n\n- An uncontrolled memory allocation and a crash in the\n__zzip_parse_root_directory function.\n\n- An invalid memory address dereference was discovered in\nzzip_disk_fread in mmapped.c.\n\n- A memory leak triggered in the function zzip_mem_disk_new in\nmemdisk.c.\"\n );\n # https://nvd.nist.gov/vuln/search/results?form_type=Advanced&results_type=overview&query=zziplib&search_type=all&pub_start_date=01%2F01%2F2017&pub_end_date=07%2F06%2F2018\"\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c432817f\"\n );\n # https://vuxml.freebsd.org/freebsd/7764b219-8148-11e8-aa4d-000e0cd7b374.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?eae19ef5\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:zziplib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/07/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/07/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"zziplib<0.13.68\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-12-13T07:09:56", "bulletinFamily": "scanner", "description": "Update zziplib to 0.13.69 version, fixes all known CVEs for the\npackage.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "modified": "2019-12-02T00:00:00", "id": "FEDORA_2018-237E9B550C.NASL", "href": "https://www.tenable.com/plugins/nessus/120292", "published": "2019-01-03T00:00:00", "title": "Fedora 28 : zziplib (2018-237e9b550c)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-237e9b550c.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(120292);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/09/25 17:12:11\");\n\n script_cve_id(\"CVE-2017-5974\", \"CVE-2018-6541\", \"CVE-2018-7726\");\n script_xref(name:\"FEDORA\", value:\"2018-237e9b550c\");\n\n script_name(english:\"Fedora 28 : zziplib (2018-237e9b550c)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update zziplib to 0.13.69 version, fixes all known CVEs for the\npackage.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-237e9b550c\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected zziplib package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:zziplib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:28\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/07/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^28([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 28\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC28\", reference:\"zziplib-0.13.69-1.fc28\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"zziplib\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-12-13T06:29:50", "bulletinFamily": "scanner", "description": "According to the versions of the zziplib package installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - An issue was discovered in ZZIPlib 0.13.68. An invalid\n memory address dereference was discovered in\n zzip_disk_fread in mmapped.c. The vulnerability causes\n an application crash, which leads to denial of\n service.(CVE-2018-7725 )\n\n - An issue was discovered in ZZIPlib 0.13.68. There is a\n bus error caused by the __zzip_parse_root_directory\n function of zip.c. Attackers could leverage this\n vulnerability to cause a denial of service via a\n crafted zip file.(CVE-2018-7726)\n\n - An issue was discovered in ZZIPlib 0.13.68. There is a\n memory leak triggered in the function zzip_mem_disk_new\n in memdisk.c, which will lead to a denial of service\n attack.(CVE-2018-7727)\n\n - In ZZIPlib 0.13.67, there is a bus error caused by\n loading of a misaligned address (when handling\n disk64_trailer local entries) in\n __zzip_fetch_disk_trailer (zzip/zip.c). Remote\n attackers could leverage this vulnerability to cause a\n denial of service via a crafted zip\n file.(CVE-2018-6541)\n\n - An issue was discovered in ZZIPlib through 0.13.69.\n There is a memory leak triggered in the function\n __zzip_parse_root_directory in zip.c, which will lead\n to a denial of service attack.(CVE-2018-16548)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-12-02T00:00:00", "id": "EULEROS_SA-2019-2236.NASL", "href": "https://www.tenable.com/plugins/nessus/130698", "published": "2019-11-08T00:00:00", "title": "EulerOS 2.0 SP5 : zziplib (EulerOS-SA-2019-2236)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(130698);\n script_version(\"1.1\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\n \"CVE-2018-16548\",\n \"CVE-2018-6541\",\n \"CVE-2018-7725\",\n \"CVE-2018-7726\",\n \"CVE-2018-7727\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : zziplib (EulerOS-SA-2019-2236)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the zziplib package installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - An issue was discovered in ZZIPlib 0.13.68. An invalid\n memory address dereference was discovered in\n zzip_disk_fread in mmapped.c. The vulnerability causes\n an application crash, which leads to denial of\n service.(CVE-2018-7725 )\n\n - An issue was discovered in ZZIPlib 0.13.68. There is a\n bus error caused by the __zzip_parse_root_directory\n function of zip.c. Attackers could leverage this\n vulnerability to cause a denial of service via a\n crafted zip file.(CVE-2018-7726)\n\n - An issue was discovered in ZZIPlib 0.13.68. There is a\n memory leak triggered in the function zzip_mem_disk_new\n in memdisk.c, which will lead to a denial of service\n attack.(CVE-2018-7727)\n\n - In ZZIPlib 0.13.67, there is a bus error caused by\n loading of a misaligned address (when handling\n disk64_trailer local entries) in\n __zzip_fetch_disk_trailer (zzip/zip.c). Remote\n attackers could leverage this vulnerability to cause a\n denial of service via a crafted zip\n file.(CVE-2018-6541)\n\n - An issue was discovered in ZZIPlib through 0.13.69.\n There is a memory leak triggered in the function\n __zzip_parse_root_directory in zip.c, which will lead\n to a denial of service attack.(CVE-2018-16548)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2236\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?51f34646\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected zziplib packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:zziplib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\n\nflag = 0;\n\npkgs = [\"zziplib-0.13.62-11.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"zziplib\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-12-13T06:43:46", "bulletinFamily": "scanner", "description": "An update for zziplib is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Low. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link (s) in the References section.\n\nThe zziplib is a lightweight library to easily extract data from zip\nfiles.\n\nSecurity Fix(es) :\n\n* zziplib: out of bound read in mmapped.c:zzip_disk_fread() causes\ncrash (CVE-2018-7725)\n\n* zziplib: Bus error in zip.c:__zzip_parse_root_directory() cause\ncrash via crafted zip file (CVE-2018-7726)\n\n* zziplib: Memory leak in memdisk.c:zzip_mem_disk_new() can lead to\ndenial of service via crafted zip (CVE-2018-7727)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nAdditional Changes :\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 7.6 Release Notes linked from the References section.", "modified": "2019-12-02T00:00:00", "id": "CENTOS_RHSA-2018-3229.NASL", "href": "https://www.tenable.com/plugins/nessus/118999", "published": "2018-11-16T00:00:00", "title": "CentOS 7 : zziplib (CESA-2018:3229)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:3229 and \n# CentOS Errata and Security Advisory 2018:3229 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(118999);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/10/02 15:30:22\");\n\n script_cve_id(\"CVE-2018-7725\", \"CVE-2018-7726\", \"CVE-2018-7727\");\n script_xref(name:\"RHSA\", value:\"2018:3229\");\n\n script_name(english:\"CentOS 7 : zziplib (CESA-2018:3229)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for zziplib is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Low. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link (s) in the References section.\n\nThe zziplib is a lightweight library to easily extract data from zip\nfiles.\n\nSecurity Fix(es) :\n\n* zziplib: out of bound read in mmapped.c:zzip_disk_fread() causes\ncrash (CVE-2018-7725)\n\n* zziplib: Bus error in zip.c:__zzip_parse_root_directory() cause\ncrash via crafted zip file (CVE-2018-7726)\n\n* zziplib: Memory leak in memdisk.c:zzip_mem_disk_new() can lead to\ndenial of service via crafted zip (CVE-2018-7727)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nAdditional Changes :\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 7.6 Release Notes linked from the References section.\"\n );\n # https://lists.centos.org/pipermail/centos-cr-announce/2018-November/005743.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c8f2e875\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected zziplib packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:zziplib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:zziplib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:zziplib-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/03/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"zziplib-0.13.62-9.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"zziplib-devel-0.13.62-9.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"zziplib-utils-0.13.62-9.el7\")) flag++;\n\n\nif (flag)\n{\n cr_plugin_caveat = '\\n' +\n 'NOTE: The security advisory associated with this vulnerability has a\\n' +\n 'fixed package version that may only be available in the continuous\\n' +\n 'release (CR) repository for CentOS, until it is present in the next\\n' +\n 'point release of CentOS.\\n\\n' +\n\n 'If an equal or higher package level does not exist in the baseline\\n' +\n 'repository for your major version of CentOS, then updates from the CR\\n' +\n 'repository will need to be applied in order to address the\\n' +\n 'vulnerability.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + cr_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"zziplib / zziplib-devel / zziplib-utils\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "openvas": [{"lastseen": "2019-05-29T18:34:30", "bulletinFamily": "scanner", "description": "Agostino Sarubbo discovered multiple vulnerabilities in zziplib, a\nlibrary to access Zip archives, which could result in denial of service\nand potentially the execution of arbitrary code if a malformed archive\nis processed.", "modified": "2019-03-18T00:00:00", "published": "2017-06-12T00:00:00", "id": "OPENVAS:1361412562310703878", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703878", "title": "Debian Security Advisory DSA 3878-1 (zziplib - security update)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3878.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Auto-generated from advisory DSA 3878-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703878\");\n script_version(\"$Revision: 14275 $\");\n script_cve_id(\"CVE-2017-5974\", \"CVE-2017-5975\", \"CVE-2017-5976\", \"CVE-2017-5978\", \"CVE-2017-5979\", \"CVE-2017-5980\", \"CVE-2017-5981\");\n script_name(\"Debian Security Advisory DSA 3878-1 (zziplib - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-06-12 00:00:00 +0200 (Mon, 12 Jun 2017)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2017/dsa-3878.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(9|8)\");\n script_tag(name:\"affected\", value:\"zziplib on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie), these problems have been fixed in\nversion 0.13.62-3+deb8u1.\n\nFor the upcoming stable distribution (stretch), these problems have been\nfixed in version 0.13.62-3.1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 0.13.62-3.1.\n\nWe recommend that you upgrade your zziplib packages.\");\n script_tag(name:\"summary\", value:\"Agostino Sarubbo discovered multiple vulnerabilities in zziplib, a\nlibrary to access Zip archives, which could result in denial of service\nand potentially the execution of arbitrary code if a malformed archive\nis processed.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libzzip-0-13\", ver:\"0.13.62-3.1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libzzip-dev\", ver:\"0.13.62-3.1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zziplib-bin\", ver:\"0.13.62-3.1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libzzip-0-13\", ver:\"0.13.62-3+deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libzzip-dev\", ver:\"0.13.62-3+deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zziplib-bin\", ver:\"0.13.62-3+deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:33:57", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2017-06-16T00:00:00", "id": "OPENVAS:1361412562310843208", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843208", "title": "Ubuntu Update for zziplib USN-3320-1", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for zziplib USN-3320-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843208\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-06-16 07:00:17 +0200 (Fri, 16 Jun 2017)\");\n script_cve_id(\"CVE-2017-5974\", \"CVE-2017-5975\", \"CVE-2017-5976\", \"CVE-2017-5978\",\n \"CVE-2017-5979\", \"CVE-2017-5980\", \"CVE-2017-5981\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for zziplib USN-3320-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'zziplib'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Agostino Sarubbo discovered that zziplib\n incorrectly handled certain malformed ZIP files. If a user or automated system\n were tricked into opening a specially crafted ZIP file, a remote attacker could\n cause zziplib to crash, resulting in a denial of service, or possibly execute\n arbitrary code.\");\n script_tag(name:\"affected\", value:\"zziplib on Ubuntu 17.04,\n Ubuntu 16.10,\n Ubuntu 16.04 LTS,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3320-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3320-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|17\\.04|16\\.10|16\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13:amd64\", ver:\"0.13.62-2ubuntu0.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13:i386\", ver:\"0.13.62-2ubuntu0.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13:amd64\", ver:\"0.13.62-3ubuntu0.17.04.1\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13:i386\", ver:\"0.13.62-3ubuntu0.17.04.1\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13:amd64\", ver:\"0.13.62-3ubuntu0.16.10.1\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13:i386\", ver:\"0.13.62-3ubuntu0.16.10.1\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13:amd64\", ver:\"0.13.62-3ubuntu0.16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13:i386\", ver:\"0.13.62-3ubuntu0.16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-24T12:57:23", "bulletinFamily": "scanner", "description": "Agostino Sarubbo discovered multiple vulnerabilities in zziplib, a\nlibrary to access Zip archives, which could result in denial of service\nand potentially the execution of arbitrary code if a malformed archive\nis processed.", "modified": "2017-07-07T00:00:00", "published": "2017-06-12T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=703878", "id": "OPENVAS:703878", "title": "Debian Security Advisory DSA 3878-1 (zziplib - security update)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3878.nasl 6607 2017-07-07 12:04:25Z cfischer $\n# Auto-generated from advisory DSA 3878-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703878);\n script_version(\"$Revision: 6607 $\");\n script_cve_id(\"CVE-2017-5974\", \"CVE-2017-5975\", \"CVE-2017-5976\", \"CVE-2017-5978\", \"CVE-2017-5979\", \"CVE-2017-5980\", \"CVE-2017-5981\");\n script_name(\"Debian Security Advisory DSA 3878-1 (zziplib - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:04:25 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2017-06-12 00:00:00 +0200 (Mon, 12 Jun 2017)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2017/dsa-3878.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"zziplib on Debian Linux\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie), these problems have been fixed in\nversion 0.13.62-3+deb8u1.\n\nFor the upcoming stable distribution (stretch), these problems have been\nfixed in version 0.13.62-3.1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 0.13.62-3.1.\n\nWe recommend that you upgrade your zziplib packages.\");\n script_tag(name: \"summary\", value: \"Agostino Sarubbo discovered multiple vulnerabilities in zziplib, a\nlibrary to access Zip archives, which could result in denial of service\nand potentially the execution of arbitrary code if a malformed archive\nis processed.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libzzip-0-13\", ver:\"0.13.62-3.1\", rls_regex:\"DEB9.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libzzip-dev\", ver:\"0.13.62-3.1\", rls_regex:\"DEB9.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"zziplib-bin\", ver:\"0.13.62-3.1\", rls_regex:\"DEB9.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libzzip-0-13\", ver:\"0.13.62-3+deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libzzip-dev\", ver:\"0.13.62-3+deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"zziplib-bin\", ver:\"0.13.62-3+deb8u1\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:33:30", "bulletinFamily": "scanner", "description": "CVE-2017-5974\nHeap-based buffer overflow in the __zzip_get32 function in fetch.c\nin zziplib allows remote attackers to cause a denial of service\n(crash) via a crafted ZIP file.\n\nCVE-2017-5975\nHeap-based buffer overflow in the __zzip_get64 function in fetch.c\nin zziplib allows remote attackers to cause a denial of service\n(crash) via a crafted ZIP file.\n\nCVE-2017-5976\nHeap-based buffer overflow in the zzip_mem_entry_extra_block\nfunction in memdisk.c in zziplib allows remote attackers to cause\na denial of service (crash) via a crafted ZIP file.\n\nCVE-2017-5978\nThe zzip_mem_entry_new function in memdisk.c in zziplib allows\nremote attackers to cause a denial of service (out-of-bounds\nread and crash) via a crafted ZIP file.\n\nCVE-2017-5979\nThe prescan_entry function in fseeko.c in zziplib allows remote\nattackers to cause a denial of service (NULL pointer dereference\nand crash) via a crafted ZIP file.\n\nCVE-2017-5980\nThe zzip_mem_entry_new function in memdisk.c in zziplib allows\nremote attackers to cause a denial of service (NULL pointer\ndereference and crash) via a crafted ZIP file.\n\nCVE-2017-5981\nseeko.c in zziplib allows remote attackers to cause a denial of\nservice (assertion failure and crash) via a crafted ZIP file.", "modified": "2019-03-18T00:00:00", "published": "2018-01-29T00:00:00", "id": "OPENVAS:1361412562310890994", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310890994", "title": "Debian LTS Advisory ([SECURITY] [DLA 994-1] zziplib security update)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: deb_dla_994.nasl 14270 2019-03-18 14:24:29Z cfischer $\n#\n# Auto-generated from advisory DLA 994-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.890994\");\n script_version(\"$Revision: 14270 $\");\n script_cve_id(\"CVE-2017-5974\", \"CVE-2017-5975\", \"CVE-2017-5976\", \"CVE-2017-5978\", \"CVE-2017-5979\", \"CVE-2017-5980\", \"CVE-2017-5981\");\n script_name(\"Debian LTS Advisory ([SECURITY] [DLA 994-1] zziplib security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:24:29 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-29 00:00:00 +0100 (Mon, 29 Jan 2018)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2017/06/msg00023.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB7\");\n script_tag(name:\"affected\", value:\"zziplib on Debian Linux\");\n script_tag(name:\"solution\", value:\"For Debian 7 'Wheezy', these problems have been fixed in version\n0.13.56-1.1+deb7u1.\n\nWe recommend that you upgrade your zziplib packages.\");\n script_tag(name:\"summary\", value:\"CVE-2017-5974\nHeap-based buffer overflow in the __zzip_get32 function in fetch.c\nin zziplib allows remote attackers to cause a denial of service\n(crash) via a crafted ZIP file.\n\nCVE-2017-5975\nHeap-based buffer overflow in the __zzip_get64 function in fetch.c\nin zziplib allows remote attackers to cause a denial of service\n(crash) via a crafted ZIP file.\n\nCVE-2017-5976\nHeap-based buffer overflow in the zzip_mem_entry_extra_block\nfunction in memdisk.c in zziplib allows remote attackers to cause\na denial of service (crash) via a crafted ZIP file.\n\nCVE-2017-5978\nThe zzip_mem_entry_new function in memdisk.c in zziplib allows\nremote attackers to cause a denial of service (out-of-bounds\nread and crash) via a crafted ZIP file.\n\nCVE-2017-5979\nThe prescan_entry function in fseeko.c in zziplib allows remote\nattackers to cause a denial of service (NULL pointer dereference\nand crash) via a crafted ZIP file.\n\nCVE-2017-5980\nThe zzip_mem_entry_new function in memdisk.c in zziplib allows\nremote attackers to cause a denial of service (NULL pointer\ndereference and crash) via a crafted ZIP file.\n\nCVE-2017-5981\nseeko.c in zziplib allows remote attackers to cause a denial of\nservice (assertion failure and crash) via a crafted ZIP file.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libzzip-0-13\", ver:\"0.13.56-1.1+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libzzip-dev\", ver:\"0.13.56-1.1+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zziplib-bin\", ver:\"0.13.56-1.1+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:32:56", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-09-14T00:00:00", "id": "OPENVAS:1361412562310875060", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875060", "title": "Fedora Update for zziplib FEDORA-2018-45183aab17", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_45183aab17_zziplib_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for zziplib FEDORA-2018-45183aab17\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875060\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-09-14 07:47:34 +0200 (Fri, 14 Sep 2018)\");\n script_cve_id(\"CVE-2018-6869\", \"CVE-2018-6484\", \"CVE-2018-6541\", \"CVE-2018-7727\",\n \"CVE-2018-6381\", \"CVE-2018-7725\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for zziplib FEDORA-2018-45183aab17\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'zziplib'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n script_tag(name:\"affected\", value:\"zziplib on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-45183aab17\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKVLTCQZTM4IO2OP63CRKPLX6NQKLQ2O\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"zziplib\", rpm:\"zziplib~0.13.69~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:33:22", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-18T00:00:00", "published": "2018-07-04T00:00:00", "id": "OPENVAS:1361412562310843579", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843579", "title": "Ubuntu Update for zziplib USN-3699-1", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3699_1.nasl 14288 2019-03-18 16:34:17Z cfischer $\n#\n# Ubuntu Update for zziplib USN-3699-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843579\");\n script_version(\"$Revision: 14288 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 17:34:17 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-07-04 05:56:39 +0200 (Wed, 04 Jul 2018)\");\n script_cve_id(\"CVE-2018-6381\", \"CVE-2018-6484\", \"CVE-2018-6540\", \"CVE-2018-6541\",\n \"CVE-2018-6869\", \"CVE-2018-7725\", \"CVE-2018-7726\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for zziplib USN-3699-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'zziplib'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"It was discovered that zziplib incorrectly handled certain malformed ZIP\nfiles. If a user or automated system were tricked into opening a specially\ncrafted ZIP file, a remote attacker could cause zziplib to crash, resulting\nin a denial of service, or possibly execute arbitrary code.\");\n script_tag(name:\"affected\", value:\"zziplib on Ubuntu 18.04 LTS,\n Ubuntu 17.10,\n Ubuntu 16.04 LTS,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"USN\", value:\"3699-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3699-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|17\\.10|18\\.04 LTS|16\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13\", ver:\"0.13.62-2ubuntu0.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13\", ver:\"0.13.62-3.1ubuntu0.17.10.1\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU18.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13\", ver:\"0.13.62-3.1ubuntu0.18.04.1\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libzzip-0-13\", ver:\"0.13.62-3ubuntu0.16.04.2\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "ubuntu": [{"lastseen": "2019-05-29T19:21:15", "bulletinFamily": "unix", "description": "Agostino Sarubbo discovered that zziplib incorrectly handled certain malformed ZIP files. If a user or automated system were tricked into opening a specially crafted ZIP file, a remote attacker could cause zziplib to crash, resulting in a denial of service, or possibly execute arbitrary code.", "modified": "2017-06-15T00:00:00", "published": "2017-06-15T00:00:00", "id": "USN-3320-1", "href": "https://usn.ubuntu.com/3320-1/", "title": "zziplib vulnerabilities", "type": "ubuntu", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T19:21:36", "bulletinFamily": "unix", "description": "It was discovered that zziplib incorrectly handled certain malformed ZIP files. If a user or automated system were tricked into opening a specially crafted ZIP file, a remote attacker could cause zziplib to crash, resulting in a denial of service, or possibly execute arbitrary code.", "modified": "2018-07-03T00:00:00", "published": "2018-07-03T00:00:00", "id": "USN-3699-1", "href": "https://usn.ubuntu.com/3699-1/", "title": "zziplib vulnerabilities", "type": "ubuntu", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "debian": [{"lastseen": "2019-05-30T02:21:21", "bulletinFamily": "unix", "description": "Package : zziplib\nVersion : 0.13.56-1.1+deb7u1\nCVE ID : CVE-2017-5974 CVE-2017-5975 CVE-2017-5976 CVE-2017-5978\n CVE-2017-5979 CVE-2017-5980 CVE-2017-5981\n\nCVE-2017-5974\n Heap-based buffer overflow in the __zzip_get32 function in fetch.c\n in zziplib allows remote attackers to cause a denial of service\n (crash) via a crafted ZIP file.\n\nCVE-2017-5975\n Heap-based buffer overflow in the __zzip_get64 function in fetch.c\n in zziplib allows remote attackers to cause a denial of service\n (crash) via a crafted ZIP file.\n\nCVE-2017-5976\n Heap-based buffer overflow in the zzip_mem_entry_extra_block\n function in memdisk.c in zziplib allows remote attackers to cause\n a denial of service (crash) via a crafted ZIP file.\n\nCVE-2017-5978\n The zzip_mem_entry_new function in memdisk.c in zziplib allows\n remote attackers to cause a denial of service (out-of-bounds\n read and crash) via a crafted ZIP file.\n\nCVE-2017-5979\n The prescan_entry function in fseeko.c in zziplib allows remote\n attackers to cause a denial of service (NULL pointer dereference\n and crash) via a crafted ZIP file.\n\nCVE-2017-5980\n The zzip_mem_entry_new function in memdisk.c in zziplib allows\n remote attackers to cause a denial of service (NULL pointer\n dereference and crash) via a crafted ZIP file.\n\nCVE-2017-5981\n seeko.c in zziplib allows remote attackers to cause a denial of\n service (assertion failure and crash) via a crafted ZIP file.\n\n\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n0.13.56-1.1+deb7u1.\n\nWe recommend that you upgrade your zziplib packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "modified": "2017-06-20T20:25:47", "published": "2017-06-20T20:25:47", "id": "DEBIAN:DLA-994-1:44807", "href": "https://lists.debian.org/debian-lts-announce/2017/debian-lts-announce-201706/msg00023.html", "title": "[SECURITY] [DLA 994-1] zziplib security update", "type": "debian", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-30T02:21:17", "bulletinFamily": "unix", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3878-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nJune 12, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : zziplib\nCVE ID : CVE-2017-5974 CVE-2017-5975 CVE-2017-5976 CVE-2017-5978 \n CVE-2017-5979 CVE-2017-5980 CVE-2017-5981\n\nAgostino Sarubbo discovered multiple vulnerabilities in zziplib, a\nlibrary to access Zip archives, which could result in denial of service\nand potentially the execution of arbitrary code if a malformed archive\nis processed.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 0.13.62-3+deb8u1.\n\nFor the upcoming stable distribution (stretch), these problems have been\nfixed in version 0.13.62-3.1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 0.13.62-3.1.\n\nWe recommend that you upgrade your zziplib packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "modified": "2017-06-12T18:53:35", "published": "2017-06-12T18:53:35", "id": "DEBIAN:DSA-3878-1:9871A", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00138.html", "title": "[SECURITY] [DSA 3878-1] zziplib security update", "type": "debian", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "cve": [{"lastseen": "2019-05-29T18:17:08", "bulletinFamily": "NVD", "description": "The prescan_entry function in fseeko.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted ZIP file.", "modified": "2017-11-04T01:29:00", "id": "CVE-2017-5979", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5979", "published": "2017-03-01T15:59:00", "title": "CVE-2017-5979", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-10-04T12:19:20", "bulletinFamily": "NVD", "description": "seeko.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (assertion failure and crash) via a crafted ZIP file.", "modified": "2019-10-03T00:03:00", "id": "CVE-2017-5981", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5981", "published": "2017-03-01T15:59:00", "title": "CVE-2017-5981", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-10-04T12:26:49", "bulletinFamily": "NVD", "description": "An issue was discovered in ZZIPlib 0.13.68. There is a memory leak triggered in the function zzip_mem_disk_new in memdisk.c, which will lead to a denial of service attack.", "modified": "2019-10-03T00:03:00", "id": "CVE-2018-7727", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7727", "published": "2018-03-06T17:29:00", "title": "CVE-2018-7727", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:20:29", "bulletinFamily": "NVD", "description": "An issue was discovered in ZZIPlib 0.13.68. There is a bus error caused by the __zzip_parse_root_directory function of zip.c. Attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.", "modified": "2019-03-05T18:08:00", "id": "CVE-2018-7726", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7726", "published": "2018-03-06T17:29:00", "title": "CVE-2018-7726", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:17:08", "bulletinFamily": "NVD", "description": "Heap-based buffer overflow in the __zzip_get64 function in fetch.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.", "modified": "2017-11-04T01:29:00", "id": "CVE-2017-5975", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5975", "published": "2017-03-01T15:59:00", "title": "CVE-2017-5975", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:17:08", "bulletinFamily": "NVD", "description": "The zzip_mem_entry_extra_block function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted ZIP file.", "modified": "2017-03-07T02:59:00", "id": "CVE-2017-5977", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5977", "published": "2017-03-01T15:59:00", "title": "CVE-2017-5977", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:17:08", "bulletinFamily": "NVD", "description": "The zzip_mem_entry_new function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted ZIP file.", "modified": "2017-11-04T01:29:00", "id": "CVE-2017-5980", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5980", "published": "2017-03-01T15:59:00", "title": "CVE-2017-5980", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:17:08", "bulletinFamily": "NVD", "description": "Heap-based buffer overflow in the zzip_mem_entry_extra_block function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.", "modified": "2017-11-04T01:29:00", "id": "CVE-2017-5976", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5976", "published": "2017-03-01T15:59:00", "title": "CVE-2017-5976", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-10-04T12:26:47", "bulletinFamily": "NVD", "description": "In ZZIPlib 0.13.67, there is a bus error caused by loading of a misaligned address (when handling disk64_trailer local entries) in __zzip_fetch_disk_trailer (zzip/zip.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.", "modified": "2019-10-03T00:03:00", "id": "CVE-2018-6541", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6541", "published": "2018-02-02T09:29:00", "title": "CVE-2018-6541", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:17:08", "bulletinFamily": "NVD", "description": "Heap-based buffer overflow in the __zzip_get32 function in fetch.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.", "modified": "2017-11-04T01:29:00", "id": "CVE-2017-5974", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5974", "published": "2017-03-01T15:59:00", "title": "CVE-2017-5974", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:31:54", "bulletinFamily": "unix", "description": "\nNIST reports (by search in the range 2017/01/01 - 2018/07/06):\n\n17 security fixes in this release:\n\nHeap-based buffer overflow in the __zzip_get32 function in fetch.c.\nHeap-based buffer overflow in the __zzip_get64 function in fetch.c.\nHeap-based buffer overflow in the zzip_mem_entry_extra_block function\n\t in memdisk.c.\nThe zzip_mem_entry_new function in memdisk.c allows remote attackers\n\t to cause a denial of service (out-of-bounds read and crash) via a\n\t crafted ZIP file.\nThe prescan_entry function in fseeko.c allows remote attackers to cause\n\t a denial of service (NULL pointer dereference and crash) via crafted\n\t ZIP file.\nThe zzip_mem_entry_new function in memdisk.c cause a NULL pointer\n\t dereference and crash via a crafted ZIP file.\nseeko.c cause a denial of service (assertion failure and crash) via a\n\t crafted ZIP file.\nA segmentation fault caused by invalid memory access in the\n\t zzip_disk_fread function because the size variable is not validated\n\t against the amount of file->stored data.\nA memory alignment error and bus error in the __zzip_fetch_disk_trailer\n\t function of zzip/zip.c.\nA bus error caused by loading of a misaligned address in the\n\t zzip_disk_findfirst function.\nAn uncontrolled memory allocation and a crash in the __zzip_parse_root_directory\n\t function.\nAn invalid memory address dereference was discovered in zzip_disk_fread\n\t in mmapped.c.\nA memory leak triggered in the function zzip_mem_disk_new in\n\t memdisk.c.\n\n\n", "modified": "2017-03-01T00:00:00", "published": "2017-03-01T00:00:00", "id": "7764B219-8148-11E8-AA4D-000E0CD7B374", "href": "https://vuxml.freebsd.org/freebsd/7764b219-8148-11e8-aa4d-000e0cd7b374.html", "title": "zziplib - multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "centos": [{"lastseen": "2019-05-29T18:35:48", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2018:3229\n\n\nThe zziplib is a lightweight library to easily extract data from zip files.\n\nSecurity Fix(es):\n\n* zziplib: out of bound read in mmapped.c:zzip_disk_fread() causes crash (CVE-2018-7725)\n\n* zziplib: Bus error in zip.c:__zzip_parse_root_directory() cause crash via crafted zip file (CVE-2018-7726)\n\n* zziplib: Memory leak in memdisk.c:zzip_mem_disk_new() can lead to denial of service via crafted zip (CVE-2018-7727)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2018-November/005743.html\n\n**Affected packages:**\nzziplib\nzziplib-devel\nzziplib-utils\n\n**Upstream details at:**\n", "modified": "2018-11-15T18:54:23", "published": "2018-11-15T18:54:23", "id": "CESA-2018:3229", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2018-November/005743.html", "title": "zziplib security update", "type": "centos", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-08-30T10:43:23", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2019:2196\n\n\nThe zziplib is a lightweight library to easily extract data from zip files.\n\nSecurity Fix(es):\n\n* zziplib: Bus error caused by loading of a misaligned address inzzip/zip.c (CVE-2018-6541)\n\n* zziplib: Memory leak triggered in the function __zzip_parse_root_directory in zip.c (CVE-2018-16548)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2019-August/006196.html\n\n**Affected packages:**\nzziplib\nzziplib-devel\nzziplib-utils\n\n**Upstream details at:**\n", "modified": "2019-08-30T04:38:06", "published": "2019-08-30T04:38:06", "id": "CESA-2019:2196", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2019-August/006196.html", "title": "zziplib security update", "type": "centos", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:38:42", "bulletinFamily": "unix", "description": "[0.13.62-9]\n- Fix covscan warning\n- 'Variable 'file' going out of scope leaks the storage it points to.'\n has been introduced by the original version of 0001-fix-CVE-2018-7725.patch\n- Related: 1558596\n[0.13.62-8]\n- Fix CVE-2018-7727\n- Resolves: 1558891\n[0.13.62-7]\n- Fix CVE-2018-7726\n- Resolves: 1558623\n[0.13.62-6]\n- Fix CVE-2018-7725\n- Resolves: 1558596", "modified": "2018-11-05T00:00:00", "published": "2018-11-05T00:00:00", "id": "ELSA-2018-3229", "href": "http://linux.oracle.com/errata/ELSA-2018-3229.html", "title": "zziplib security update", "type": "oraclelinux", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-08-14T08:38:02", "bulletinFamily": "unix", "description": "[0.13.62-11]\n- Fix CVE-2018-6541\n- Part of the original patch has already been applied in the past (CVE-2018-7726),\n so the bug should not be reproducible in a way described in the github\n issue, even without this commit. Applying the rest of the original patch anyway.\n- https://github.com/gdraheim/zziplib/issues/16\n- Related: CVE-2018-6541\n[0.13.62-10]\n- Fix CVE-2018-16548\n- Resolves: CVE-2018-16548", "modified": "2019-08-13T00:00:00", "published": "2019-08-13T00:00:00", "id": "ELSA-2019-2196", "href": "http://linux.oracle.com/errata/ELSA-2019-2196.html", "title": "zziplib security update", "type": "oraclelinux", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:46:21", "bulletinFamily": "unix", "description": "The zziplib is a lightweight library to easily extract data from zip files.\n\nSecurity Fix(es):\n\n* zziplib: out of bound read in mmapped.c:zzip_disk_fread() causes crash (CVE-2018-7725)\n\n* zziplib: Bus error in zip.c:__zzip_parse_root_directory() cause crash via crafted zip file (CVE-2018-7726)\n\n* zziplib: Memory leak in memdisk.c:zzip_mem_disk_new() can lead to denial of service via crafted zip (CVE-2018-7727)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.", "modified": "2018-10-30T09:22:12", "published": "2018-10-30T08:32:25", "id": "RHSA-2018:3229", "href": "https://access.redhat.com/errata/RHSA-2018:3229", "type": "redhat", "title": "(RHSA-2018:3229) Low: zziplib security update", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-08-15T00:45:32", "bulletinFamily": "unix", "description": "The zziplib is a lightweight library to easily extract data from zip files.\n\nSecurity Fix(es):\n\n* zziplib: Bus error caused by loading of a misaligned address inzzip/zip.c (CVE-2018-6541)\n\n* zziplib: Memory leak triggered in the function __zzip_parse_root_directory in zip.c (CVE-2018-16548)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.", "modified": "2019-08-06T13:41:33", "published": "2019-08-06T12:12:11", "id": "RHSA-2019:2196", "href": "https://access.redhat.com/errata/RHSA-2019:2196", "type": "redhat", "title": "(RHSA-2019:2196) Low: zziplib security update", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}]}