Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2019.0093
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2019-0093)
Zusammenfassung:The remote host is missing an update for the 'zziplib' package(s) announced via the MGASA-2019-0093 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'zziplib' package(s) announced via the MGASA-2019-0093 advisory.

Vulnerability Insight:
In ZZIPlib 0.13.67, there is a segmentation fault caused by invalid memory
access in the zzip_disk_fread function (zzip/mmapped.c) because the size
variable is not validated against the amount of file->stored data
(CVE-2018-6381).

An unaligned memory access bug was found in the way ZZIPlib handled ZIP files.
This flaw could potentially be used to crash the application using ZZIPlib by
tricking the application into processing specially crafted ZIP files
(CVE-2018-6484).

In ZZIPlib 0.13.67, there is a bus error caused by loading of a misaligned
address in the zzip_disk_findfirst function of zzip/mmapped.c. Remote
attackers could leverage this vulnerability to cause a denial of service via a
crafted zip file (CVE-2018-6540).

A flaw was found in ZZIPlib 0.13.67, there is a bus error caused by loading of
a misaligned address (when handling disk64_trailer local entries) in
__zzip_fetch_disk_trailer (zzip/zip.c). Remote attackers could leverage this
vulnerability to cause a denial of service via a crafted zip file
(CVE-2018-6541).

In ZZIPlib 0.13.67, there is a bus error (when handling a disk64_trailer seek
value) caused by loading of a misaligned address in the zzip_disk_findfirst
function of zzip/mmapped.c (CVE-2018-6542).

An uncontrolled memory allocation was found in ZZIPlib that could lead to a
crash in the __zzip_parse_root_directory function of zzip/zip.c if the package
is compiled with Address Sanitizer. Remote attackers could leverage this
vulnerability to cause a denial of service via a crafted zip file
(CVE-2018-6869).

An out of bounds read was found in function zzip_disk_fread of ZZIPlib, up to
0.13.68, when ZZIPlib mem_disk functionality is used. Remote attackers could
leverage this vulnerability to cause a denial of service via a crafted zip
file (CVE-2018-7725).

An improper input validation was found in function __zzip_fetch_disk_trailer
of ZZIPlib, up to 0.13.68, that could lead to a crash in
__zzip_parse_root_directory function of zzip/zip.c. Remote attackers could
leverage this vulnerability to cause a denial of service via a crafted zip
file (CVE-2018-7726).

A memory leak was found in unzip-mem.c and unzzip-mem.c of ZZIPlib, up to
v0.13.68, that could lead to resource exhaustion. Local attackers could
leverage this vulnerability to cause a denial of service via a crafted zip
file (CVE-2018-7727).

An issue was discovered in ZZIPlib through 0.13.69. There is a memory leak
triggered in the function __zzip_parse_root_directory in zip.c, which could
lead to a denial of service attack (CVE-2018-16548).

A flaw was found in ZZIPlib 0.13.69. A directory traversal vulnerability
allows attackers to overwrite arbitrary files via a .. (dot dot) in a zip
file, because of the function unzzip_cat in the bins/unzzipcat-mem.c file
(CVE-2018-17828).

Affected Software/OS:
'zziplib' package(s) on Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2018-16548
https://github.com/gdraheim/zziplib/issues/58
https://lists.debian.org/debian-lts-announce/2020/06/msg00029.html
RedHat Security Advisories: RHSA-2019:2196
https://access.redhat.com/errata/RHSA-2019:2196
SuSE Security Announcement: openSUSE-SU-2019:2394 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00066.html
SuSE Security Announcement: openSUSE-SU-2019:2396 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00065.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-17828
https://github.com/gdraheim/zziplib/issues/62
Common Vulnerability Exposure (CVE) ID: CVE-2018-6381
https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-6381
https://github.com/gdraheim/zziplib/issues/12
https://usn.ubuntu.com/3699-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-6484
https://github.com/gdraheim/zziplib/issues/14
Common Vulnerability Exposure (CVE) ID: CVE-2018-6540
https://github.com/gdraheim/zziplib/issues/15
Common Vulnerability Exposure (CVE) ID: CVE-2018-6541
https://github.com/gdraheim/zziplib/issues/16
Common Vulnerability Exposure (CVE) ID: CVE-2018-6542
https://github.com/gdraheim/zziplib/issues/17
Common Vulnerability Exposure (CVE) ID: CVE-2018-6869
BugTraq ID: 103050
http://www.securityfocus.com/bid/103050
https://github.com/gdraheim/zziplib/issues/22
https://lists.debian.org/debian-lts-announce/2018/02/msg00022.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-7725
https://github.com/gdraheim/zziplib/issues/39
RedHat Security Advisories: RHSA-2018:3229
https://access.redhat.com/errata/RHSA-2018:3229
Common Vulnerability Exposure (CVE) ID: CVE-2018-7726
https://github.com/gdraheim/zziplib/issues/41
Common Vulnerability Exposure (CVE) ID: CVE-2018-7727
https://github.com/gdraheim/zziplib/issues/40
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.