Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.851927
Kategorie:SuSE Local Security Checks
Titel:openSUSE: Security Advisory for unzip (openSUSE-SU-2018:3043-1)
Zusammenfassung:The remote host is missing an update for the 'unzip'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'unzip'
package(s) announced via the referenced advisory.

Vulnerability Insight:
This update for unzip fixes the following security issues:

- CVE-2014-9913: Specially crafted zip files could trigger invalid memory
writes possibly resulting in DoS or corruption (bsc#1013993)

- CVE-2015-7696: Specially crafted zip files with password protection
could trigger a crash and lead to denial of service (bsc#950110)

- CVE-2015-7697: Specially crafted zip files could trigger an endless loop
and lead to denial of service (bsc#950111)

- CVE-2016-9844: Specially crafted zip files could trigger invalid memory
writes possibly resulting in DoS or corruption (bsc#1013992)

- CVE-2018-1000035: Prevent heap-based buffer overflow in the processing
of password-protected archives that allowed an attacker to perform a
denial of service or to possibly achieve code execution (bsc#1080074).

- CVE-2014-9636: Prevent denial of service (out-of-bounds read or write
and crash) via an extra field with an uncompressed size smaller than the
compressed field size in a zip archive that advertises STORED method
compression (bsc#914442).

This non-security issue was fixed:

- Allow processing of Windows zip64 archives (Windows archivers set
total_disks field to 0 but per standard, valid values are 1 and higher)
(bnc#910683)

This update was imported from the SUSE:SLE-12:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1124=1

Affected Software/OS:
unzip on openSUSE Leap 42.3

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-9636
BugTraq ID: 71825
http://www.securityfocus.com/bid/71825
Debian Security Information: DSA-3152 (Google Search)
http://www.debian.org/security/2015/dsa-3152
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148792.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148849.html
https://security.gentoo.org/glsa/201611-01
http://seclists.org/oss-sec/2014/q4/489
http://seclists.org/oss-sec/2014/q4/496
http://seclists.org/oss-sec/2015/q1/216
http://seclists.org/oss-sec/2014/q4/1131
http://secunia.com/advisories/62738
http://secunia.com/advisories/62751
http://www.ubuntu.com/usn/USN-2489-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-9913
BugTraq ID: 95081
http://www.securityfocus.com/bid/95081
http://www.openwall.com/lists/oss-security/2014/11/03/5
http://www.openwall.com/lists/oss-security/2016/12/05/13
http://www.openwall.com/lists/oss-security/2016/12/05/19
http://www.openwall.com/lists/oss-security/2016/12/05/20
Common Vulnerability Exposure (CVE) ID: CVE-2015-7696
BugTraq ID: 76863
http://www.securityfocus.com/bid/76863
Debian Security Information: DSA-3386 (Google Search)
http://www.debian.org/security/2015/dsa-3386
http://www.openwall.com/lists/oss-security/2015/09/07/4
http://www.openwall.com/lists/oss-security/2015/09/15/6
http://www.openwall.com/lists/oss-security/2015/09/21/6
http://www.openwall.com/lists/oss-security/2015/10/11/5
http://www.securitytracker.com/id/1034027
http://www.ubuntu.com/usn/USN-2788-1
http://www.ubuntu.com/usn/USN-2788-2
Common Vulnerability Exposure (CVE) ID: CVE-2015-7697
http://sourceforge.net/p/infozip/patches/23/
Common Vulnerability Exposure (CVE) ID: CVE-2016-9844
BugTraq ID: 94728
http://www.securityfocus.com/bid/94728
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.