Amazon Linux 2 : zziplib (ALAS-2019-1142)

medium Nessus Plugin ID 121051

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

An improper input validation was found in function
__zzip_fetch_disk_trailer of ZZIPlib, up to 0.13.68, that could lead to a crash in __zzip_parse_root_directory function of zzip/ip.c.
Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.(CVE-2018-7726)

A memory leak was found in unzip-mem.c and unzzip-mem.c of ZZIPlib, up to v0.13.68, that could lead to resource exhaustion. Local attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.(CVE-2018-7727)

An out of bounds read was found in function zzip_disk_fread of ZZIPlib, up to 0.13.68, when ZZIPlib mem_disk functionality is used.
Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.(CVE-2018-7725)

Solution

Run 'yum update zziplib' to update your system.

See Also

https://alas.aws.amazon.com/AL2/ALAS-2019-1142.html

Plugin Details

Severity: Medium

ID: 121051

File Name: al2_ALAS-2019-1142.nasl

Version: 1.3

Type: local

Agent: unix

Published: 1/10/2019

Updated: 6/27/2024

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2018-7727

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:zziplib, p-cpe:/a:amazon:linux:zziplib-utils, p-cpe:/a:amazon:linux:zziplib-devel, p-cpe:/a:amazon:linux:zziplib-debuginfo, cpe:/o:amazon:linux:2

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/9/2019

Vulnerability Publication Date: 3/6/2018

Reference Information

CVE: CVE-2018-7725, CVE-2018-7726, CVE-2018-7727

ALAS: 2019-1142