[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-1163

Date: (C)2012-07-12   (M)2015-12-16
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Integer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to execute arbitrary code via the size and offset values for the central directory in a zip archive, which triggers "improper restrictions of operations within the bounds of a memory buffer" and an information leak.

Reference:
GLSA-201203-23
MDVSA-2012:034
http://nih.at/listarchive/libzip-discuss/msg00252.html
http://www.openwall.com/lists/oss-security/2012/03/21/2
http://www.openwall.com/lists/oss-security/2012/03/29/11
http://www.nih.at/libzip/NEWS.html

CPE    1
cpe:/a:nih:libzip:0.10
CWE    1
CWE-189
OVAL    3
oval:org.secpod.oval:def:302865
oval:org.secpod.oval:def:1300047
oval:org.secpod.oval:def:103620

© 2013 SecPod Technologies