SB2018100513 - OpenSUSE Linux update for unzip
Published: October 5, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2014-9636)
2) Buffer overflow (CVE-ID: CVE-2014-9913)
The vulnerability allows a local non-authenticated attacker to perform service disruption.
Buffer overflow in the list_files function in list.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via vectors related to the compression method.
3) Out-of-bounds read (CVE-ID: CVE-2015-7696)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in Info-ZIP UnZip 6.0. A remote attacker can perform a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value.
4) Resource management error (CVE-ID: CVE-2015-7697)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive.
5) Input validation error (CVE-ID: CVE-2016-9844)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the zi_short() function in zipinfo.c when processing a large compression method value in the central directory file header. A remote attacker can pass a specially crafted array to the application and trigger denial of service (DoS) condition.
6) Heap-based buffer overflow (CVE-ID: CVE-2018-1000035)
Remediation
Install update from vendor's website.