ALT-PU-2020-3281-1
Closed vulnerabilities
BDU:2018-00031
Уязвимость функции list_files (list.c) файлового архиватора Info-ZIP Unzip, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00032
Уязвимость функции zi_short в (zipinfo.c) файлового архиватора Info-ZIP Unzip, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-01516
Уязвимость файла list.c архиватора Info-ZIP UnZip, позволяющая нарушителю выполнить произвольный код
BDU:2019-03340
Уязвимость файлового архиватора Info-ZIP Unzip, связанная с переполнением буфера на основе кучи, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2014-8139
Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174844
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174844
Modified: 2024-11-21
CVE-2014-8140
Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174851
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174851
Modified: 2024-11-21
CVE-2014-8141
Heap-based buffer overflow in the getZip64Data function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174856
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174856
Modified: 2025-04-12
CVE-2014-9636
unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148792.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148849.html
- http://seclists.org/oss-sec/2014/q4/1131
- http://seclists.org/oss-sec/2014/q4/489
- http://seclists.org/oss-sec/2014/q4/496
- http://seclists.org/oss-sec/2015/q1/216
- http://secunia.com/advisories/62738
- http://secunia.com/advisories/62751
- http://www.debian.org/security/2015/dsa-3152
- http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=450
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/71825
- http://www.ubuntu.com/usn/USN-2489-1
- https://security.gentoo.org/glsa/201611-01
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148792.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148849.html
- http://seclists.org/oss-sec/2014/q4/1131
- http://seclists.org/oss-sec/2014/q4/489
- http://seclists.org/oss-sec/2014/q4/496
- http://seclists.org/oss-sec/2015/q1/216
- http://secunia.com/advisories/62738
- http://secunia.com/advisories/62751
- http://www.debian.org/security/2015/dsa-3152
- http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=450
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/71825
- http://www.ubuntu.com/usn/USN-2489-1
- https://security.gentoo.org/glsa/201611-01
Modified: 2025-04-20
CVE-2014-9913
Buffer overflow in the list_files function in list.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via vectors related to the compression method.
- http://www.openwall.com/lists/oss-security/2014/11/03/5
- http://www.openwall.com/lists/oss-security/2016/12/05/13
- http://www.openwall.com/lists/oss-security/2016/12/05/19
- http://www.openwall.com/lists/oss-security/2016/12/05/20
- http://www.securityfocus.com/bid/95081
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
- http://www.openwall.com/lists/oss-security/2014/11/03/5
- http://www.openwall.com/lists/oss-security/2016/12/05/13
- http://www.openwall.com/lists/oss-security/2016/12/05/19
- http://www.openwall.com/lists/oss-security/2016/12/05/20
- http://www.securityfocus.com/bid/95081
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
Modified: 2025-04-12
CVE-2015-7696
Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value.
- http://www.debian.org/security/2015/dsa-3386
- http://www.openwall.com/lists/oss-security/2015/09/07/4
- http://www.openwall.com/lists/oss-security/2015/09/15/6
- http://www.openwall.com/lists/oss-security/2015/09/21/6
- http://www.openwall.com/lists/oss-security/2015/10/11/5
- http://www.securityfocus.com/bid/76863
- http://www.securitytracker.com/id/1034027
- http://www.ubuntu.com/usn/USN-2788-1
- http://www.ubuntu.com/usn/USN-2788-2
- http://www.debian.org/security/2015/dsa-3386
- http://www.openwall.com/lists/oss-security/2015/09/07/4
- http://www.openwall.com/lists/oss-security/2015/09/15/6
- http://www.openwall.com/lists/oss-security/2015/09/21/6
- http://www.openwall.com/lists/oss-security/2015/10/11/5
- http://www.securityfocus.com/bid/76863
- http://www.securitytracker.com/id/1034027
- http://www.ubuntu.com/usn/USN-2788-1
- http://www.ubuntu.com/usn/USN-2788-2
Modified: 2025-04-12
CVE-2015-7697
Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive.
- http://sourceforge.net/p/infozip/patches/23/
- http://www.debian.org/security/2015/dsa-3386
- http://www.openwall.com/lists/oss-security/2015/09/07/4
- http://www.openwall.com/lists/oss-security/2015/09/15/6
- http://www.openwall.com/lists/oss-security/2015/10/11/5
- http://www.securityfocus.com/bid/76863
- http://www.securitytracker.com/id/1034027
- http://www.ubuntu.com/usn/USN-2788-1
- http://www.ubuntu.com/usn/USN-2788-2
- http://sourceforge.net/p/infozip/patches/23/
- http://www.debian.org/security/2015/dsa-3386
- http://www.openwall.com/lists/oss-security/2015/09/07/4
- http://www.openwall.com/lists/oss-security/2015/09/15/6
- http://www.openwall.com/lists/oss-security/2015/10/11/5
- http://www.securityfocus.com/bid/76863
- http://www.securitytracker.com/id/1034027
- http://www.ubuntu.com/usn/USN-2788-1
- http://www.ubuntu.com/usn/USN-2788-2
Modified: 2025-04-20
CVE-2016-9844
Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header.
- http://www.openwall.com/lists/oss-security/2016/12/05/13
- http://www.openwall.com/lists/oss-security/2016/12/05/19
- http://www.openwall.com/lists/oss-security/2016/12/05/20
- http://www.securityfocus.com/bid/94728
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
- http://www.openwall.com/lists/oss-security/2016/12/05/13
- http://www.openwall.com/lists/oss-security/2016/12/05/19
- http://www.openwall.com/lists/oss-security/2016/12/05/20
- http://www.securityfocus.com/bid/94728
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
Modified: 2024-11-21
CVE-2018-1000035
A heap-based buffer overflow exists in Info-Zip UnZip version <= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution.
- https://lists.debian.org/debian-lts-announce/2020/01/msg00026.html
- https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
- https://security.gentoo.org/glsa/202003-58
- https://lists.debian.org/debian-lts-announce/2020/01/msg00026.html
- https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
- https://security.gentoo.org/glsa/202003-58
Modified: 2024-11-21
CVE-2018-18384
Info-ZIP UnZip 6.0 has a buffer overflow in list.c, when a ZIP archive has a crafted relationship between the compressed-size value and the uncompressed-size value, because a buffer size is 10 and is supposed to be 12.
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00009.html
- https://access.redhat.com/errata/RHSA-2019:2159
- https://bugzilla.suse.com/show_bug.cgi?id=1110194
- https://sourceforge.net/p/infozip/bugs/53/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00009.html
- https://access.redhat.com/errata/RHSA-2019:2159
- https://bugzilla.suse.com/show_bug.cgi?id=1110194
- https://sourceforge.net/p/infozip/bugs/53/