Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-1614

Опубликовано: 23 мар. 2007
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the zzip_open_shared_io function in zzip/file.c in ZZIPlib Library before 0.13.49 allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long filename.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zziplibfixed0.13.49-0package
zziplibno-dsaetchpackage

Примечания

  • http://www.securitylab.ru/forum/read.php?FID=21&TID=40858&MID=326187#message326187

  • If an attacker can supply arbitrary file names, we likely suffer from

  • an information disclosure issue anyway.

EPSS

Процентиль: 90%
0.05948
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

Stack-based buffer overflow in the zzip_open_shared_io function in zzip/file.c in ZZIPlib Library before 0.13.49 allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long filename.

nvd
больше 18 лет назад

Stack-based buffer overflow in the zzip_open_shared_io function in zzip/file.c in ZZIPlib Library before 0.13.49 allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long filename.

github
больше 3 лет назад

Stack-based buffer overflow in the zzip_open_shared_io function in zzip/file.c in ZZIPlib Library before 0.13.49 allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long filename.

EPSS

Процентиль: 90%
0.05948
Низкий