Denial of service in ZZIPlib

Published: 2018-03-14 16:12:23
Severity Low
Patch available YES
Number of vulnerabilities 3
CVE ID CVE-2018-7727
CVE-2018-7725
CVE-2018-7726
CVSSv3 3.8 [CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:U/RC:C]
3.8 [CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:U/RC:C]
3.8 [CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:U/RC:C]
CWE ID CWE-401
CWE-119
Exploitation vector Local
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Public exploit code for vulnerability #3 is available.
Vulnerable software ZZIPlib
Vulnerable software versions ZZIPlib 0.13.68
Vendor URL zziplib.sourceforge.net

Security Advisory

1) Memory corruption

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the zzip_mem_disk_new function due to boundary error. A local attacker can send a specially crafted input, trigger memory leaks and cause the service to crash.

Remediation

Cybersecurity is currently unaware of any solutions addressing the vulnerability.

External links

https://github.com/gdraheim/zziplib/issues/40

2) Memory corruption

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the zzip_disk_fread function due to boundary error. A local attacker can send a specially crafted input, trigger invalid memory address dereference condition and cause the service to crash.

Remediation

Cybersecurity is currently unaware of any solutions addressing the vulnerability.

External links

https://github.com/gdraheim/zziplib/issues/39

3) Memory corruption

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the __zzip_parse_root_directory function due to boundary error. A local attacker can supply a specially crafted .zip file to be processed, trigger a bus error and cause the service to crash.

Remediation

Cybersecurity is currently unaware of any solutions addressing the vulnerability.

External links

https://github.com/gdraheim/zziplib/issues/41

Back to List