Debian Libzip vulnerabilities
7 known vulnerabilities affecting debian/libzip.
Total CVEs
7
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM1LOW4
Vulnerabilities
Page 1 of 1
CVE-2019-17582LOWCVSS 9.82019
CVE-2019-17582 [CRITICAL] CVE-2019-17582: libzip - A use-after-free in the _zip_dirent_read function of zip_dirent.c in libzip 1.2....
A use-after-free in the _zip_dirent_read function of zip_dirent.c in libzip 1.2.0 allows attackers to have an unspecified impact by attempting to unzip a malformed ZIP archive. NOTE: the discoverer states "This use-after-free is triggered prior to the double free reported in CVE-2017-12858."
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid:
debian
CVE-2017-14107LOWCVSS 6.5fixed in libzip 1.5.1-3 (bookworm)2017
CVE-2017-14107 [MEDIUM] CVE-2017-14107: libzip - The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EO...
The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive.
Scope: local
bookworm: resolved (fixed in 1.5.1-3)
bullseye: resolved (fixed in 1.5.1-3)
forky: resolved (fixed in 1.5.1-3)
sid
debian
CVE-2017-12858LOWCVSS 9.82017
CVE-2017-12858 [CRITICAL] CVE-2017-12858: libzip - Double free vulnerability in the _zip_dirent_read function in zip_dirent.c in li...
Double free vulnerability in the _zip_dirent_read function in zip_dirent.c in libzip allows attackers to have unspecified impact via unknown vectors.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2015-2331HIGHCVSS 7.5fixed in libzip 0.11.2-1.2 (bookworm)2015
CVE-2015-2331 [HIGH] CVE-2015-2331: libzip - Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 ...
Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading t
debian
CVE-2012-1162HIGHCVSS 7.5fixed in libzip 0.10.1-1 (bookworm)2012
CVE-2012-1162 [HIGH] CVE-2012-1162: libzip - Heap-based buffer overflow in the _zip_readcdir function in zip_open.c in libzip...
Heap-based buffer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a zip archive with the number of directories set to 0, related to an "incorrect loop construct."
Scope: local
bookworm: resolved (fixed in 0.10.1-1)
bullseye: resolved (fix
debian
CVE-2012-1163MEDIUMCVSS 6.8fixed in libzip 0.10.1-1 (bookworm)2012
CVE-2012-1163 [MEDIUM] CVE-2012-1163: libzip - Integer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allo...
Integer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to execute arbitrary code via the size and offset values for the central directory in a zip archive, which triggers "improper restrictions of operations within the bounds of a memory buffer" and an information leak.
Scope: local
bookworm: resolved (fixed in 0.10.1-1)
b
debian
CVE-2011-0421LOWCVSS 4.3PoCfixed in libzip 0.10-1 (bookworm)2011
CVE-2011-0421 [MEDIUM] CVE-2011-0421: libzip - The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP b...
The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service (NULL pointer dereference) via an empty ZIP archive that is processed with a (1) locateName or (2) statName operation.
Scope: local
bookworm
debian