Heap-based buffer overflow in unzip (Alpine package)



Published: 2018-08-20
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2014-8140
CWE-ID CWE-122
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
unzip (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Heap-based buffer overflow

EUVDB-ID: #VU33145

Risk: Medium

CVSSv3.1: 6.8 [AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-8140

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier. A remote attacker can use a crafted zip file in the -t command argument to the unzip command. to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

unzip (Alpine package): 6.0-r2

External links

http://git.alpinelinux.org/aports/commit/?id=2d5ea9b0ef18df74869bf77e2b9b7beda9a8cfe8
http://git.alpinelinux.org/aports/commit/?id=55374a75a54b07b8c1d75d154dfc2524813d6f09
http://git.alpinelinux.org/aports/commit/?id=8c7e0d5c8061d459c8b2b33b122206ec6fa59163
http://git.alpinelinux.org/aports/commit/?id=1a9d4e34862869cd3a82d1ce5c75be04b144229a
http://git.alpinelinux.org/aports/commit/?id=6ece7a7a8aae5e1063c1441b28969ffba2fb3228
http://git.alpinelinux.org/aports/commit/?id=72e1f06331bda12d25432e1c3c502a08c3e7529f
http://git.alpinelinux.org/aports/commit/?id=b8ea797bc3374e3cd762e284d9e600ff4935b864
http://git.alpinelinux.org/aports/commit/?id=c15201030ffd0c922075b586e73f318ca8d6857c


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###