Debian DSA-3386-1 : unzip - security update

medium Nessus Plugin ID 86680

Synopsis

The remote Debian host is missing a security-related update.

Description

Two vulnerabilities have been found in unzip, a de-archiver for .zip files. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2015-7696 Gustavo Grieco discovered that unzip incorrectly handled certain password protected archives. If a user or automated system were tricked into processing a specially crafted zip archive, an attacker could possibly execute arbitrary code.

- CVE-2015-7697 Gustavo Grieco discovered that unzip incorrectly handled certain malformed archives. If a user or automated system were tricked into processing a specially crafted zip archive, an attacker could possibly cause unzip to hang, resulting in a denial of service.

Solution

Upgrade the unzip packages.

For the oldstable distribution (wheezy), these problems have been fixed in version 6.0-8+deb7u4.

For the stable distribution (jessie), these problems have been fixed in version 6.0-16+deb8u1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802160

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802162

https://security-tracker.debian.org/tracker/CVE-2015-7696

https://security-tracker.debian.org/tracker/CVE-2015-7697

https://packages.debian.org/source/wheezy/unzip

https://packages.debian.org/source/jessie/unzip

https://www.debian.org/security/2015/dsa-3386

Plugin Details

Severity: Medium

ID: 86680

File Name: debian_DSA-3386.nasl

Version: 2.8

Type: local

Agent: unix

Published: 11/2/2015

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:8.0, p-cpe:/a:debian:debian_linux:unzip, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 10/31/2015

Reference Information

CVE: CVE-2015-7696, CVE-2015-7697

DSA: 3386