|
Message-ID: <CACn5sdRQaUEHfde5QzqnOSv829baMEgDBCN7n8rzzrb+1s2uMw@mail.gmail.com> Date: Mon, 7 Sep 2015 08:57:20 -0300 From: Gustavo Grieco <gustavo.grieco@...il.com> To: oss-security@...ts.openwall.com Subject: Heap overflow and DoS in unzip 6.0 Hello, Two issues were found in unzip 6.0: * A heap overflow triggered by unzipping a file with password (e.g unzip -p -P x sigsegv.zip) * A denegation of service with a file that never finishes unzipping (e.g. unzip sigxcpu.zip). Upstream is notified. Nevertheless the test cases as well as the valgrind and the adress sanitizer reports of the heap overflow case are attached (as a single file) in case someone wants to provide some feedback. These issues were found with QuickFuzz. Regards, Gustavo. Content of type "text/html" skipped View attachment "report.txt" of type "text/plain" (13268 bytes) Download attachment "sigsegv.zip" of type "application/zip" (720 bytes) Download attachment "sigxcpu.zip" of type "application/zip" (516 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.