[USN-18-1] zip vulnerability

Martin Pitt martin.pitt at canonical.com
Fri Nov 5 17:14:47 UTC 2004

Ubuntu Security Notice USN-18-1		  November 05, 2004
zip vulnerability

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:


The problem can be corrected by upgrading the affected package to
version 2.30-6ubuntu0.1.  In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

HexView discovered a buffer overflow in the zip package. The overflow
is triggered by creating a ZIP archive of files with very long path
names. This vulnerability might result in execution of arbitrary code
with the privileges of the user who calls zip.

This flaw may lead to privilege escalation on systems which
automatically create ZIP archives of user supplied files, like backup
systems or web applications.

  Source archives:

      Size/MD5:    15683 dd26c4c85464bff935f39d72d5704589
      Size/MD5:      526 ff598e352d1e70b35a06d93583557270
      Size/MD5:   728636 9426b2042139de1f112f271ebdcb0ff0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

      Size/MD5:   101572 36e834cfe5405bf2a92abdf0b3d4067b

  i386 architecture (x86 compatible Intel/AMD)

      Size/MD5:    91602 abd725fa35fc9c4482da1ca32cf9d374

  powerpc architecture (Apple Macintosh G3/G4/G5)

      Size/MD5:    96648 9f8b310ae415756a1a629bc6bccf1f70
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20041105/6b35bcfd/attachment.sig>

More information about the ubuntu-security-announce mailing list