Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2014-9913 |
CWE-ID | CWE-119 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
unzip (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU33147
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2014-9913
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local non-authenticated attacker to perform service disruption.
Buffer overflow in the list_files function in list.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via vectors related to the compression method.
MitigationInstall update from vendor's website.
Vulnerable software versionsunzip (Alpine package): 6.0-r2
CPE2.3 External linkshttps://git.alpinelinux.org/aports/commit/?id=2d5ea9b0ef18df74869bf77e2b9b7beda9a8cfe8
https://git.alpinelinux.org/aports/commit/?id=55374a75a54b07b8c1d75d154dfc2524813d6f09
https://git.alpinelinux.org/aports/commit/?id=8c7e0d5c8061d459c8b2b33b122206ec6fa59163
https://git.alpinelinux.org/aports/commit/?id=1a9d4e34862869cd3a82d1ce5c75be04b144229a
https://git.alpinelinux.org/aports/commit/?id=6ece7a7a8aae5e1063c1441b28969ffba2fb3228
https://git.alpinelinux.org/aports/commit/?id=72e1f06331bda12d25432e1c3c502a08c3e7529f
https://git.alpinelinux.org/aports/commit/?id=b8ea797bc3374e3cd762e284d9e600ff4935b864
https://git.alpinelinux.org/aports/commit/?id=c15201030ffd0c922075b586e73f318ca8d6857c
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.