Debian Security Advisory DSA 1522-1 (unzip)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update to unzip announced via advisory DSA 1522-1.
Insight
Insight
Tavis Ormandy discovered that unzip, when processing specially crafted ZIP archives, could pass invalid pointers to the C library's free routine, potentially leading to arbitrary code execution (CVE-2008-0888). For the stable distribution (etch), this problem has been fixed in version 5.52-9etch1. For the old stable distribution (sarge), this problem has been fixed in version 5.52-1sarge5. The unstable distribution (sid) will be fixed soon. We recommend that you upgrade your unzip package.
Solution
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201522-1
Common Vulnerabilities and Exposures (CVE)
Download Mageni to scan and fix this vulnerability. It is free and easy.
Processing. Please wait...
Free for 7-days then $4 USD monthly regardless of how many IPs, scans, users, or deployments you have. No Contracts, Cancel at Anytime and 7-days Money-Back Guarantee.