Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 7 Sep 2015 08:57:20 -0300
From: Gustavo Grieco <gustavo.grieco@...il.com>
To: oss-security@...ts.openwall.com
Subject: Heap overflow and DoS in unzip 6.0

Hello,

Two issues were found in unzip 6.0:

* A heap overflow triggered by unzipping a file with password (e.g unzip -p
-P x sigsegv.zip)
* A denegation of service with a file that never finishes unzipping (e.g.
unzip sigxcpu.zip).

Upstream is notified. Nevertheless the test cases as well as the valgrind
and the adress sanitizer reports of the heap overflow case are attached (as
a single file) in case someone wants to provide some feedback. These issues
were found with QuickFuzz.

Regards,
Gustavo.

Content of type "text/html" skipped

View attachment "report.txt" of type "text/plain" (13268 bytes)

Download attachment "sigsegv.zip" of type "application/zip" (720 bytes)

Download attachment "sigxcpu.zip" of type "application/zip" (516 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ