CVE-2008-0888

Name
CVE-2008-0888
Description
The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
secalert@redhat.com http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
secalert@redhat.com http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
Vendor Advisory http://secunia.com/advisories/29392
Vendor Advisory http://secunia.com/advisories/29406
Vendor Advisory http://secunia.com/advisories/29415
Vendor Advisory http://secunia.com/advisories/29427
Vendor Advisory http://secunia.com/advisories/29432
Vendor Advisory http://secunia.com/advisories/29440
Vendor Advisory http://secunia.com/advisories/29495
Vendor Advisory http://secunia.com/advisories/29681
Patch http://secunia.com/advisories/30535
Vendor Advisory http://secunia.com/advisories/31204
secalert@redhat.com http://security.gentoo.org/glsa/glsa-200804-06.xml
secalert@redhat.com http://support.apple.com/kb/HT4077
secalert@redhat.com http://wiki.rpath.com/Advisories:rPSA-2008-0116
secalert@redhat.com http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0116
secalert@redhat.com http://www.debian.org/security/2008/dsa-1522
secalert@redhat.com http://www.ipcop.org/index.php?name=News&file=article&sid=40
secalert@redhat.com http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:068
Vendor Advisory http://www.redhat.com/support/errata/RHSA-2008-0196.html
secalert@redhat.com http://www.securityfocus.com/archive/1/489967/100/0/threaded
secalert@redhat.com http://www.securityfocus.com/archive/1/493080/100/0/threaded
secalert@redhat.com http://www.securityfocus.com/bid/28288
secalert@redhat.com http://www.securitytracker.com/id?1019634
secalert@redhat.com http://www.ubuntu.com/usn/usn-589-1
secalert@redhat.com http://www.vmware.com/security/advisories/VMSA-2008-0009.html
Vendor Advisory http://www.vupen.com/english/advisories/2008/0913/references
Vendor Advisory http://www.vupen.com/english/advisories/2008/1744
secalert@redhat.com https://exchange.xforce.ibmcloud.com/vulnerabilities/41246
secalert@redhat.com https://issues.rpath.com/browse/RPL-2317
secalert@redhat.com https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9733

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:info-zip:unzip:*:*:*:*:*:*:*:* unzip == None == None
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* ubuntu_linux == None == 6.06
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* ubuntu_linux == None == 6.10
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* ubuntu_linux == None == 7.04
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* ubuntu_linux == None == 7.10

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
unzip edge-main 6.0-r15 Timo Teräs <timo.teras@iki.fi> possibly vulnerable
unzip edge-main 6.0-r16 Timo Teräs <timo.teras@iki.fi> possibly vulnerable