7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.259 Low
EPSS
Percentile
96.0%
The unzip utility is used to list, test, or extract files from a
zip archive.
A buffer overflow was found in the way unzip uncompressed certain extra
fields of a file. A specially crafted Zip archive could cause unzip to
crash or, possibly, execute arbitrary code when the archive was tested with
unzip’s ‘-t’ option. (CVE-2014-9636)
A buffer overflow flaw was found in the way unzip computed the CRC32
checksum of certain extra fields of a file. A specially crafted Zip archive
could cause unzip to crash when the archive was tested with unzip’s ‘-t’
option. (CVE-2014-8139)
An integer underflow flaw, leading to a buffer overflow, was found in the
way unzip uncompressed certain extra fields of a file. A specially crafted
Zip archive could cause unzip to crash when the archive was tested with
unzip’s ‘-t’ option. (CVE-2014-8140)
A buffer overflow flaw was found in the way unzip handled Zip64 files.
A specially crafted Zip archive could possibly cause unzip to crash when
the archive was uncompressed. (CVE-2014-8141)
Red Hat would like to thank oCERT for reporting the CVE-2014-8139,
CVE-2014-8140, and CVE-2014-8141 issues. oCERT acknowledges Michele
Spagnuolo of the Google Security Team as the original reporter of
these issues.
All unzip users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | i686 | unzip-debuginfo | < 6.0-2.el6_6 | unzip-debuginfo-6.0-2.el6_6.i686.rpm |
RedHat | 6 | s390x | unzip-debuginfo | < 6.0-2.el6_6 | unzip-debuginfo-6.0-2.el6_6.s390x.rpm |
RedHat | 6 | s390x | unzip | < 6.0-2.el6_6 | unzip-6.0-2.el6_6.s390x.rpm |
RedHat | 6 | ppc64 | unzip-debuginfo | < 6.0-2.el6_6 | unzip-debuginfo-6.0-2.el6_6.ppc64.rpm |
RedHat | 7 | ppc64 | unzip-debuginfo | < 6.0-15.el7 | unzip-debuginfo-6.0-15.el7.ppc64.rpm |
RedHat | 6 | i686 | unzip | < 6.0-2.el6_6 | unzip-6.0-2.el6_6.i686.rpm |
RedHat | 7 | s390x | unzip | < 6.0-15.el7 | unzip-6.0-15.el7.s390x.rpm |
RedHat | 7 | x86_64 | unzip-debuginfo | < 6.0-15.el7 | unzip-debuginfo-6.0-15.el7.x86_64.rpm |
RedHat | 7 | s390x | unzip-debuginfo | < 6.0-15.el7 | unzip-debuginfo-6.0-15.el7.s390x.rpm |
RedHat | 6 | src | unzip | < 6.0-2.el6_6 | unzip-6.0-2.el6_6.src.rpm |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.259 Low
EPSS
Percentile
96.0%