You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A stack-buffer-overflow was discovered in zziplibv 0.13.77. The issue is being triggered in function __zzip_fetch_disk_trailer() at zzip/zip.c:340.Attackers may exploit this vulnerability to execute and cause a DOS attack.
Reproduce:
Tested in Ubuntu 22.04
First,Compile the program with address sanitizer:
* When ZZIP_DISK64_TRAILER defined we must check if the tail obtained
have the size of the zzip_disk_trailer struct. end - tail should be at
least >= of the size but not size - 2.
* Fixgdraheim#165
Signed-off-by: vlefebvre <valentin.lefebvre@suse.com>
* When ZZIP_DISK64_TRAILER defined we must check if the tail obtained
have the size of the zzip_disk_trailer struct. end - tail should be at
least >= of the size but not size - 2.
* Fixgdraheim#165
Signed-off-by: vlefebvre <valentin.lefebvre@suse.com>
Describe
A stack-buffer-overflow was discovered in zziplibv 0.13.77. The issue is being triggered in function __zzip_fetch_disk_trailer() at zzip/zip.c:340.Attackers may exploit this vulnerability to execute and cause a DOS attack.
Reproduce:
Tested in Ubuntu 22.04
First,Compile the program with address sanitizer:
AFL_USE_ASAN=1 CC=afl-clang-fast CXX=afl-clang-fast++ cmake ..
Then the poc is inputed:
/home/zziplib/build/bins/unzzip -l /home/zziplib/build/fuzz_out/default/crashes/id\:000002\,sig\:06\,src\:000083+000079\,time\:13022109\,execs\:11393085\,op\:splice\,rep\:12
ASan Reports:
Poc
Poc file is here
Fuzzer:
Fuzzer is AFL.
The text was updated successfully, but these errors were encountered: