CVE-2017-5975

Heap-based buffer overflow in the __zzip_get64 function in fetch.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zziplib_project:zziplib:0.13.56:*:*:*:*:*:*:*
cpe:2.3:a:zziplib_project:zziplib:0.13.57:*:*:*:*:*:*:*
cpe:2.3:a:zziplib_project:zziplib:0.13.58:*:*:*:*:*:*:*
cpe:2.3:a:zziplib_project:zziplib:0.13.59:*:*:*:*:*:*:*
cpe:2.3:a:zziplib_project:zziplib:0.13.60:*:*:*:*:*:*:*
cpe:2.3:a:zziplib_project:zziplib:0.13.61:*:*:*:*:*:*:*
cpe:2.3:a:zziplib_project:zziplib:0.13.62:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://www.debian.org/security/2017/dsa-3878 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3878 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2017/02/14/3 - Mailing List () http://www.openwall.com/lists/oss-security/2017/02/14/3 - Mailing List
References () http://www.securityfocus.com/bid/96268 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96268 - Third Party Advisory, VDB Entry
References () https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get64-fetch-c/ - Exploit, Third Party Advisory () https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get64-fetch-c/ - Exploit, Third Party Advisory

Information

Published : 2017-03-01 15:59

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5975

Mitre link : CVE-2017-5975

CVE.ORG link : CVE-2017-5975


JSON object : View

Products Affected

debian

  • debian_linux

zziplib_project

  • zziplib
CWE
CWE-787

Out-of-bounds Write