blob: c2ea2c53a416e17045423a83b98d661165e1e4e8 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200411-16">
<title>zip: Path name buffer overflow</title>
zip contains a buffer overflow when creating a ZIP archive of files with
very long path names. This could lead to the execution of arbitrary code.
<product type="ebuild">zip</product>
<announced>November 09, 2004</announced>
<revised>May 22, 2006: 02</revised>
<package name="app-arch/zip" auto="yes" arch="*">
<unaffected range="ge">2.3-r4</unaffected>
<vulnerable range="le">2.3-r3</vulnerable>
zip is a compression and file packaging utility.
zip does not check the resulting path length when doing recursive
folder compression.
<impact type="normal">
An attacker could exploit this by enticing another user or web
application to create an archive including a specially-crafted path
name, potentially resulting in the execution of arbitrary code with the
permissions of the user running zip.
There is no known workaround at this time.
All zip users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-arch/zip-2.3-r4&quot;</code>
<uri link="">HexView zip Advisory</uri>
<uri link="">CVE-2004-1010</uri>
<metadata tag="requester" timestamp="Sun, 7 Nov 2004 18:59:20 +0000">
<metadata tag="bugReady" timestamp="Mon, 8 Nov 2004 15:14:42 +0000">
<metadata tag="submitter" timestamp="Mon, 8 Nov 2004 20:46:08 +0000">