Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200704-05 ] zziplib: Buffer Overflow
Date: Fri, 06 Apr 2007 23:49:58
Message-Id: 20070403225022.GG5998@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200704-05
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: zziplib: Buffer Overflow
9 Date: April 03, 2007
10 Bugs: #171441
11 ID: 200704-05
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 The zziplib library contains a buffer overflow vulnerability that could
19 lead to user-assisted remote execution of arbitrary code.
20
21 Background
22 ==========
23
24 The zziplib library is a lightweight library for extracting data from
25 files archived in a single zip file.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 dev-libs/zziplib < 0.13.49 >= 0.13.49
34
35 Description
36 ===========
37
38 dmcox dmcox discovered a boundary error in the zzip_open_shared_io()
39 function from zzip/file.c .
40
41 Impact
42 ======
43
44 A remote attacker could entice a user to run a zziplib function with an
45 overly long string as an argument which would trigger the buffer
46 overflow and may lead to the execution of arbitrary code.
47
48 Workaround
49 ==========
50
51 There is no known workaround at this time.
52
53 Resolution
54 ==========
55
56 All zziplib users should upgrade to the latest version:
57
58 # emerge --sync
59 # emerge --ask --oneshot --verbose ">=dev-libs/zziplib-0.13.49"
60
61 References
62 ==========
63
64 [ 1 ] CVE-2007-1614
65 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1614
66
67 Availability
68 ============
69
70 This GLSA and any updates to it are available for viewing at
71 the Gentoo Security Website:
72
73 http://security.gentoo.org/glsa/glsa-200704-05.xml
74
75 Concerns?
76 =========
77
78 Security is a primary focus of Gentoo Linux and ensuring the
79 confidentiality and security of our users machines is of utmost
80 importance to us. Any security concerns should be addressed to
81 security@g.o or alternatively, you may file a bug at
82 http://bugs.gentoo.org.
83
84 License
85 =======
86
87 Copyright 2007 Gentoo Foundation, Inc; referenced text
88 belongs to its owner(s).
89
90 The contents of this document are licensed under the
91 Creative Commons - Attribution / Share Alike license.
92
93 http://creativecommons.org/licenses/by-sa/2.5