CVE-2005-4667
Summary
| CVE | CVE-2005-4667 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-12-31 05:00:00 UTC |
| Updated | 2018-10-19 15:41:00 UTC |
| Description | Buffer overflow in UnZip 5.50 and earlier allows user-assisted attackers to execute arbitrary code via a long filename command line argument. NOTE: since the overflow occurs in a non-setuid program, there are not many scenarios under which it poses a vulnerability, unless unzip is passed long arguments when it is invoked from other programs. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Info-zip | Unzip | 5.2 | All | All | All |
| Application | Info-zip | Unzip | 5.3 | All | All | All |
| Application | Info-zip | Unzip | 5.31 | All | All | All |
| Application | Info-zip | Unzip | 5.32 | All | All | All |
| Application | Info-zip | Unzip | 5.40 | All | All | All |
| Application | Info-zip | Unzip | 5.41 | All | All | All |
| Application | Info-zip | Unzip | 5.42 | All | All | All |
| Application | Info-zip | Unzip | 5.50 | All | All | All |
| Application | Info-zip | Unzip | 5.2 | All | All | All |
| Application | Info-zip | Unzip | 5.3 | All | All | All |
| Application | Info-zip | Unzip | 5.31 | All | All | All |
| Application | Info-zip | Unzip | 5.32 | All | All | All |
| Application | Info-zip | Unzip | 5.40 | All | All | All |
| Application | Info-zip | Unzip | 5.41 | All | All | All |
| Application | Info-zip | Unzip | 5.42 | All | All | All |
| Application | Info-zip | Unzip | 5.50 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SecurityFocus | FEDORA | www.securityfocus.com | |
| 20051219 Unzip *ALL* verisons ;)) | FULLDISC | archives.neohapsis.com | Exploit |
| USN-248-1: unzip vulnerability | Ubuntu security notices | UBUNTU | usn.ubuntu.com | |
| 22400 | OSVDB | www.osvdb.org | |
| Debian -- Security Information -- DSA-1012-1 unzip | DEBIAN | www.debian.org | Patch, Vendor Advisory |
| 2006-0006 | TRUSTIX | www.trustix.org | Patch, Vendor Advisory |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| Support | REDHAT | www.redhat.com | |
| Red Hat Update for Multiple Packages - Advisories - Secunia | SECUNIA | secunia.com | |
| Info-ZIP Frequently Asked Questions | CONFIRM | www.info-zip.org | |
| Info-ZIP UnZip File Name Buffer Overflow Vulnerability | BID | www.securityfocus.com | Exploit |
| Advisories - Mandriva | MANDRIVA | www.mandriva.com | |
| USN-248-2: unzip regression fix | Ubuntu security notices | UBUNTU | usn.ubuntu.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2007-09-05 | Mark J Cox | Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178960 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode. |
There are currently no legacy QID mappings associated with this CVE.