Other IDs this deficiency may be known by:
|Date Last Modified
Version Specific Information:
|Cucumber 1.0 i686||fixed in unzip-6.0-i686-4 |
|Cucumber 1.0 x86_64||fixed in unzip-6.0-x86_64-4 |
|Cucumber 1.1 i686
||fixed in unzip-6.0-i686-4 |
|Cucumber 1.1 x86_64
||fixed in unzip-6.0-x86_64-4 |
=================================== Overview ===================================
unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds
read or write and crash) via an extra field with an uncompressed size smaller
than the compressed field size in a zip archive that advertises STORED method
================================ Initial Report ================================
OOB access (both read and write) issues exist in test_compr_eb
(extract.c) that can result in application crash or other unspecified
This vulnerability can be triggered via crafted zip archives with extra
fields that advertise STORED method compression (i.e. no compression)
and have uncompressed field sizes smaller than the corresponding
compressed field sizes.
This issue is different from CVE-2014-8140 .
Please allocate a CVE identifier for this vulnerability.
2014-10-24: Crasher bundled in afl
2014-11-02: Existence of crasher shared on OSS-SEC 
2014-11-03: Crasher analyzed and fix developed 
2014-11-03: Maintainer contacted 
2014-12-22: CVE requested
============================ Additional Information ============================
See RedHat's analysis at https://bugzilla.redhat.com/show_bug.cgi?id=1184985.
================================= Our Analysis =================================
----- Affected Products -----
Unzip up to and including 6.0 are vulnerable. This includes unzip as originally
packged in Cucumber Linux 1.0, 1.1 and current (as of Fri Jul 6 09:00:53 EDT
----- Scope and Impact of this Vulnerability -----
Allows for a denial of service (application crash) or other unspecified impacts
when a user attempts to extract a maliciously crafted zip archive.
----- Fix for this Vulnerability -----
This vulnerability can be fixed by applying the patch from
================================= Our Solution =================================
We have applied the aforementioned patch and rebuilt.