Heap-based buffer overflow in SUSE products - CVE-2015-2331

 

Heap-based buffer overflow in SUSE products - CVE-2015-2331

Published: March 30, 2015 / Updated: August 9, 2020


Vulnerability identifier: #VU40861
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2015-2331
CWE-ID: CWE-122
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
PHP
Debian Linux
Fedora
Opensuse
Software vendor:
PHP Group
Debian
Fedoraproject
SUSE

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products,. A remote attacker can use a ZIP archive that contains many entries to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links