CVE-2018-16548 – zziplib: Memory leak triggered in the function __zzip_parse_root_directory in zip.c
https://notcve.org/view.php?id=CVE-2018-16548
An issue was discovered in ZZIPlib through 0.13.69. There is a memory leak triggered in the function __zzip_parse_root_directory in zip.c, which will lead to a denial of service attack. Se ha descubierto un problema en ZZIPlib hasta su versión 0.13.69. Existe una fuga de memoria que se desencadena en la función __zzip_parse_root_directory en zip.c que provocará un ataque de denegación de servicio (DoS). • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00065.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00066.html https://access.redhat.com/errata/RHSA-2019:2196 https://github.com/gdraheim/zziplib/issues/58 https://lists.debian.org/debian-lts-announce/2020/06/msg00029.html https://access.redhat.com/security/cve/CVE-2018-16548 https://bugzilla.redhat.com/show_bug.cgi?id=1626200 • CWE-400: Uncontrolled Resource Consumption CWE-772: Missing Release of Resource after Effective Lifetime •
CVE-2007-1614
https://notcve.org/view.php?id=CVE-2007-1614
Stack-based buffer overflow in the zzip_open_shared_io function in zzip/file.c in ZZIPlib Library before 0.13.49 allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long filename. Desbordamiento de búfer basado en pila en la función zzip_open_shared_io de zzip/file.c en la biblioteca ZZIPlib versiones anteriores a 0.13.49 permite a atacantes remotos con la complicidad del usuario provocar una denegación de servicio (caída de aplicación) o ejecutar código de su elección mediante un nombre de fichero largo. • http://osvdb.org/33838 http://secunia.com/advisories/24586 http://secunia.com/advisories/24708 http://security.gentoo.org/glsa/glsa-200704-05.xml http://sourceforge.net/project/shownotes.php?group_id=6389&release_id=494587 http://www.mandriva.com/security/advisories?name=MDKSA-2007:093 http://www.securityfocus.com/bid/23013 http://www.securitylab.ru/forum/read.php?FID=21&TID=40858&MID=326187 http://www.vupen.com/english/advisories/2007/0998 •