Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 7 Sep 2015 08:57:20 -0300
From: Gustavo Grieco <>
Subject: Heap overflow and DoS in unzip 6.0


Two issues were found in unzip 6.0:

* A heap overflow triggered by unzipping a file with password (e.g unzip -p
-P x
* A denegation of service with a file that never finishes unzipping (e.g.

Upstream is notified. Nevertheless the test cases as well as the valgrind
and the adress sanitizer reports of the heap overflow case are attached (as
a single file) in case someone wants to provide some feedback. These issues
were found with QuickFuzz.


Content of type "text/html" skipped

View attachment "report.txt" of type "text/plain" (13268 bytes)

Download attachment "" of type "application/zip" (720 bytes)

Download attachment "" of type "application/zip" (516 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.