Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-16548 |
CWE-ID | CWE-401 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
zziplib (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU14700
Risk: Low
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2018-16548
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists due to a memory leak in the __zzip_parse_root_directory function, as defined in the zip.c source code file. A local attacker can supply specially crafted input and cause the service to crash.
MitigationInstall update from vendor's website.
Vulnerable software versionszziplib (Alpine package): 0.13.66-r0 - 0.13.69-r2
CPE2.3https://git.alpinelinux.org/aports/commit/?id=32fe19c40e22ff217cc307569058a3d044b28f74
https://git.alpinelinux.org/aports/commit/?id=e8bb72e97b585f0525711395744a1299099465fd
https://git.alpinelinux.org/aports/commit/?id=a6036af519fc3513c23839868b5d371e556dd04a
https://git.alpinelinux.org/aports/commit/?id=ece6bfda34b9d7efde7f455ad7eb4e64a50a7117
https://git.alpinelinux.org/aports/commit/?id=8068beb7764186e23ef3384d64b0a90bb0523d60
https://git.alpinelinux.org/aports/commit/?id=c900bcd2c9de78c13b43a2a598d47e035c1cb1f7
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.