3.7
CVSSv2

CVE-2005-4667

Published: 31/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 3.7 | Impact Score: 6.4 | Exploitability Score: 1.9
VMScore: 375
Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in UnZip 5.50 and previous versions allows user-assisted malicious users to execute arbitrary code via a long filename command line argument. NOTE: since the overflow occurs in a non-setuid program, there are not many scenarios under which it poses a vulnerability, unless unzip is passed long arguments when it is invoked from other programs.

Vulnerable Product Search on Vulmon Subscribe to Product

info-zip unzip 5.2

info-zip unzip 5.3

info-zip unzip 5.31

info-zip unzip 5.41

info-zip unzip 5.42

info-zip unzip 5.50

info-zip unzip 5.32

info-zip unzip 5.40

Vendor Advisories

Debian Bug report logs - #349794 unzip: Info-ZIP UnZip File Name Buffer Overflow Vulnerability Package: unzip; Maintainer for unzip is Santiago Vila <sanvila@debianorg>; Source for unzip is src:unzip (PTS, buildd, popcon) Reported by: Stephen Gran <sgran@debianorg> Date: Wed, 25 Jan 2006 10:18:36 UTC Severity: gra ...
A buffer overflow was discovered in the handling of file name arguments By tricking a user or automated system into processing a specially crafted, excessively long file name with unzip, an attacker could exploit this to execute arbitrary code with the user’s privileges ...
A buffer overflow in the command line argument parsing has been discovered in unzip, the de-archiver for ZIP files, that could lead to the execution of arbitrary code For the old stable distribution (woody) this problem has been fixed in version 550-1woody6 For the stable distribution (sarge) this problem has been fixed in version 552-1sarge4 ...

Exploits

source: wwwsecurityfocuscom/bid/15968/info Info-ZIP 'unzip' is susceptible to a filename buffer-overflow vulnerability The application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer This issue allows attackers to execute arbitrary machine code in the context of users runni ...