The read_buf function in stream.c in rzip 2.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted archive.
References
Link | Resource |
---|---|
https://blogs.gentoo.org/ago/2017/04/29/rzip-heap-based-buffer-overflow-in-read_buf-stream-c/ | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/04/msg00022.html |
Configurations
Information
Published : 2017-04-30 12:59
Updated : 2020-04-26 13:15
NVD link : CVE-2017-8364
Mitre link : CVE-2017-8364
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
rzip_project
- rzip