4 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in ZZIPlib through 0.13.69. There is a memory leak triggered in the function __zzip_parse_root_directory in zip.c, which will lead to a denial of service attack. Se ha descubierto un problema en ZZIPlib hasta su versión 0.13.69. Existe una fuga de memoria que se desencadena en la función __zzip_parse_root_directory en zip.c que provocará un ataque de denegación de servicio (DoS). • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00065.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00066.html https://access.redhat.com/errata/RHSA-2019:2196 https://github.com/gdraheim/zziplib/issues/58 https://lists.debian.org/debian-lts-announce/2020/06/msg00029.html https://access.redhat.com/security/cve/CVE-2018-16548 https://bugzilla.redhat.com/show_bug.cgi?id=1626200 • CWE-400: Uncontrolled Resource Consumption CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 1

Heap-based buffer overflow in the __zzip_get32 function in fetch.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file. Desbordamiento de búfer basado en memoria dinámica en la función __zzip_get32 en fetch.c en zziplib versiones 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 permite a atacantes remotos provocar una denegación de servicio (caída) a través de un archivo ZIP manipulado • http://www.debian.org/security/2017/dsa-3878 http://www.openwall.com/lists/oss-security/2017/02/14/3 http://www.securityfocus.com/bid/96268 https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get32-fetch-c • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 1

Heap-based buffer overflow in the __zzip_get64 function in fetch.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file. Desbordamiento de búfer basado en memoria dinámica en la función __zzip_get64 en fetch.c en zziplib versiones 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 permite atacantes remotos provocar una denegación de servicio (caída) a través de un archivo ZIP manipulado • http://www.debian.org/security/2017/dsa-3878 http://www.openwall.com/lists/oss-security/2017/02/14/3 http://www.securityfocus.com/bid/96268 https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get64-fetch-c • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 1

Heap-based buffer overflow in the zzip_mem_entry_extra_block function in memdisk.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file. Desbordamiento de búfer basado en memoria dinámica en la función zzip_mem_entry_extra_block en memdisk.c en zziplib versiones 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 permite a atacantes remotos provocar una denegación de servicio (caída) en un archivo ZIP manipulado • http://www.debian.org/security/2017/dsa-3878 http://www.openwall.com/lists/oss-security/2017/02/14/3 http://www.securityfocus.com/bid/96268 https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-zzip_mem_entry_extra_block-memdisk-c • CWE-787: Out-of-bounds Write •