The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive.
References
Link | Resource |
---|---|
https://github.com/nih-at/libzip/commit/9b46957ec98d85a572e9ef98301247f39338a3b5 | Issue Tracking Patch Third Party Advisory |
https://blogs.gentoo.org/ago/2017/09/01/libzip-memory-allocation-failure-in-_zip_cdir_grow-zip_dirent-c/ | Patch Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2021/12/msg00022.html | Mailing List Third Party Advisory |
Information
Published : 2017-09-01 10:29
Updated : 2022-04-06 11:35
NVD link : CVE-2017-14107
Mitre link : CVE-2017-14107
JSON object : View
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
Products Affected
debian
- debian_linux
libzip
- libzip