Heap-based buffer overflow in libzip - CVE-2012-1162
Published: July 12, 2012 / Updated: February 21, 2021
libzip
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10. A remote attacker can use a zip archive with the number of directories set to 0 to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2012-1162
Sources
- http://nih.at/listarchive/libzip-discuss/msg00252.html
- http://www.gentoo.org/security/en/glsa/glsa-201203-23.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:034
- http://www.nih.at/libzip/NEWS.html
- http://www.openwall.com/lists/oss-security/2012/03/21/2
- http://www.openwall.com/lists/oss-security/2012/03/29/11