Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-16892

Опубликовано: 25 сент. 2019
Источник: debian
EPSS Низкий

Описание

In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-zipfixed2.0.0-1package
ruby-zipno-dsabusterpackage
ruby-zipno-dsastretchpackage
ruby-zippostponedjessiepackage

Примечания

  • https://github.com/rubyzip/rubyzip/pull/403

  • https://github.com/rubyzip/rubyzip/commit/4167f0ce67e42b082605bca75c7bdfd01eb23804

  • https://github.com/rubyzip/rubyzip/commit/7849f7362ab0cd23d5730ef8b6f2c39252da2285

  • https://github.com/rubyzip/rubyzip/commit/97cb6aefe6d12bd2429d7a2e119ccb26f259d71d

EPSS

Процентиль: 40%
0.0018
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 6 лет назад

In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).

CVSS3: 5.5
redhat
больше 6 лет назад

In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).

CVSS3: 5.5
nvd
больше 6 лет назад

In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).

CVSS3: 5.5
github
больше 6 лет назад

Rubyzip denial of service

EPSS

Процентиль: 40%
0.0018
Низкий