SB2019102332 - Path traversal in zziplib (Alpine package)
Published: October 23, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Path traversal (CVE-ID: CVE-2018-17828)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in ZZIPlib within the unzzip_cat() function in the bins/unzzipcat-mem.c. A remote attacker can pass specially crafted archive to the application and overwrite arbitrary files on the system.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=32fe19c40e22ff217cc307569058a3d044b28f74
- https://git.alpinelinux.org/aports/commit/?id=e8bb72e97b585f0525711395744a1299099465fd
- https://git.alpinelinux.org/aports/commit/?id=a6036af519fc3513c23839868b5d371e556dd04a
- https://git.alpinelinux.org/aports/commit/?id=ece6bfda34b9d7efde7f455ad7eb4e64a50a7117
- https://git.alpinelinux.org/aports/commit/?id=8068beb7764186e23ef3384d64b0a90bb0523d60
- https://git.alpinelinux.org/aports/commit/?id=c900bcd2c9de78c13b43a2a598d47e035c1cb1f7