Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
References
Link | Resource |
---|---|
http://www.ocert.org/advisories/ocert-2014-011.html | Third Party Advisory |
http://www.securitytracker.com/id/1031433 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2015:0700 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1174844 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
13 Feb 2023, 00:43
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command. |
02 Feb 2023, 20:19
Type | Values Removed | Values Added |
---|---|---|
Summary | A buffer overflow flaw was found in the way unzip computed the CRC32 checksum of certain extra fields of a file. A specially crafted Zip archive could cause unzip to crash when the archive was tested with unzip's '-t' option. | |
References |
|
Information
Published : 2020-01-31 22:15
Updated : 2023-12-10 13:13
NVD link : CVE-2014-8139
Mitre link : CVE-2014-8139
CVE.ORG link : CVE-2014-8139
JSON object : View
Products Affected
redhat
- enterprise_linux_server_tus
- enterprise_linux_desktop
- enterprise_linux_server
- enterprise_linux_workstation
- enterprise_linux_server_aus
- enterprise_linux_server_eus
unzip_project
- unzip
CWE
CWE-787
Out-of-bounds Write