![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2019.0093 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2019-0093) |
Zusammenfassung: | The remote host is missing an update for the 'zziplib' package(s) announced via the MGASA-2019-0093 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'zziplib' package(s) announced via the MGASA-2019-0093 advisory. Vulnerability Insight: In ZZIPlib 0.13.67, there is a segmentation fault caused by invalid memory access in the zzip_disk_fread function (zzip/mmapped.c) because the size variable is not validated against the amount of file->stored data (CVE-2018-6381). An unaligned memory access bug was found in the way ZZIPlib handled ZIP files. This flaw could potentially be used to crash the application using ZZIPlib by tricking the application into processing specially crafted ZIP files (CVE-2018-6484). In ZZIPlib 0.13.67, there is a bus error caused by loading of a misaligned address in the zzip_disk_findfirst function of zzip/mmapped.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file (CVE-2018-6540). A flaw was found in ZZIPlib 0.13.67, there is a bus error caused by loading of a misaligned address (when handling disk64_trailer local entries) in __zzip_fetch_disk_trailer (zzip/zip.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file (CVE-2018-6541). In ZZIPlib 0.13.67, there is a bus error (when handling a disk64_trailer seek value) caused by loading of a misaligned address in the zzip_disk_findfirst function of zzip/mmapped.c (CVE-2018-6542). An uncontrolled memory allocation was found in ZZIPlib that could lead to a crash in the __zzip_parse_root_directory function of zzip/zip.c if the package is compiled with Address Sanitizer. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file (CVE-2018-6869). An out of bounds read was found in function zzip_disk_fread of ZZIPlib, up to 0.13.68, when ZZIPlib mem_disk functionality is used. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file (CVE-2018-7725). An improper input validation was found in function __zzip_fetch_disk_trailer of ZZIPlib, up to 0.13.68, that could lead to a crash in __zzip_parse_root_directory function of zzip/zip.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file (CVE-2018-7726). A memory leak was found in unzip-mem.c and unzzip-mem.c of ZZIPlib, up to v0.13.68, that could lead to resource exhaustion. Local attackers could leverage this vulnerability to cause a denial of service via a crafted zip file (CVE-2018-7727). An issue was discovered in ZZIPlib through 0.13.69. There is a memory leak triggered in the function __zzip_parse_root_directory in zip.c, which could lead to a denial of service attack (CVE-2018-16548). A flaw was found in ZZIPlib 0.13.69. A directory traversal vulnerability allows attackers to overwrite arbitrary files via a .. (dot dot) in a zip file, because of the function unzzip_cat in the bins/unzzipcat-mem.c file (CVE-2018-17828). Affected Software/OS: 'zziplib' package(s) on Mageia 6. Solution: Please install the updated package(s). CVSS Score: 5.8 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-16548 https://github.com/gdraheim/zziplib/issues/58 https://lists.debian.org/debian-lts-announce/2020/06/msg00029.html RedHat Security Advisories: RHSA-2019:2196 https://access.redhat.com/errata/RHSA-2019:2196 SuSE Security Announcement: openSUSE-SU-2019:2394 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00066.html SuSE Security Announcement: openSUSE-SU-2019:2396 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00065.html Common Vulnerability Exposure (CVE) ID: CVE-2018-17828 https://github.com/gdraheim/zziplib/issues/62 Common Vulnerability Exposure (CVE) ID: CVE-2018-6381 https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-6381 https://github.com/gdraheim/zziplib/issues/12 https://usn.ubuntu.com/3699-1/ Common Vulnerability Exposure (CVE) ID: CVE-2018-6484 https://github.com/gdraheim/zziplib/issues/14 Common Vulnerability Exposure (CVE) ID: CVE-2018-6540 https://github.com/gdraheim/zziplib/issues/15 Common Vulnerability Exposure (CVE) ID: CVE-2018-6541 https://github.com/gdraheim/zziplib/issues/16 Common Vulnerability Exposure (CVE) ID: CVE-2018-6542 https://github.com/gdraheim/zziplib/issues/17 Common Vulnerability Exposure (CVE) ID: CVE-2018-6869 BugTraq ID: 103050 http://www.securityfocus.com/bid/103050 https://github.com/gdraheim/zziplib/issues/22 https://lists.debian.org/debian-lts-announce/2018/02/msg00022.html Common Vulnerability Exposure (CVE) ID: CVE-2018-7725 https://github.com/gdraheim/zziplib/issues/39 RedHat Security Advisories: RHSA-2018:3229 https://access.redhat.com/errata/RHSA-2018:3229 Common Vulnerability Exposure (CVE) ID: CVE-2018-7726 https://github.com/gdraheim/zziplib/issues/41 Common Vulnerability Exposure (CVE) ID: CVE-2018-7727 https://github.com/gdraheim/zziplib/issues/40 |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |