<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to 75: zip: CVE-2018-13410</title><link>https://sourceforge.net/p/infozip/bugs/75/</link><description>Recent changes to 75: zip: CVE-2018-13410</description><atom:link href="https://sourceforge.net/p/infozip/bugs/75/feed.rss" rel="self"/><language>en</language><lastBuildDate>Tue, 22 Apr 2025 22:17:10 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/infozip/bugs/75/feed.rss" rel="self" type="application/rss+xml"/><item><title>zip: CVE-2018-13410</title><link>https://sourceforge.net/p/infozip/bugs/75/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hello. This is Debian Bug #903196 and this is the full URL for the bug:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903196" rel="nofollow"&gt;https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903196&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Follows a summary of the bug.&lt;/p&gt;
&lt;p&gt;Salvatore Bonaccorso writes:&lt;/p&gt;
&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;The&lt;span class="w"&gt; &lt;/span&gt;following&lt;span class="w"&gt; &lt;/span&gt;vulnerability&lt;span class="w"&gt; &lt;/span&gt;was&lt;span class="w"&gt; &lt;/span&gt;published&lt;span class="w"&gt; &lt;/span&gt;for&lt;span class="w"&gt; &lt;/span&gt;zip.&lt;span class="w"&gt; &lt;/span&gt;Note&lt;span class="w"&gt; &lt;/span&gt;it&lt;span class="w"&gt; &lt;/span&gt;is&lt;span class="w"&gt; &lt;/span&gt;really
disputed&lt;span class="w"&gt; &lt;/span&gt;as&lt;span class="w"&gt; &lt;/span&gt;security&lt;span class="w"&gt; &lt;/span&gt;issue,&lt;span class="w"&gt; &lt;/span&gt;filling&lt;span class="w"&gt; &lt;/span&gt;this&lt;span class="w"&gt; &lt;/span&gt;bug&lt;span class="w"&gt; &lt;/span&gt;only&lt;span class="w"&gt; &lt;/span&gt;for&lt;span class="w"&gt; &lt;/span&gt;tracking&lt;span class="w"&gt; &lt;/span&gt;the
underlying&lt;span class="w"&gt; &lt;/span&gt;bug&lt;span class="w"&gt; &lt;/span&gt;in&lt;span class="w"&gt; &lt;/span&gt;case&lt;span class="w"&gt; &lt;/span&gt;it&lt;span class="w"&gt; &lt;/span&gt;get's&lt;span class="w"&gt; &lt;/span&gt;fixed.&lt;span class="w"&gt; &lt;/span&gt;A&lt;span class="w"&gt; &lt;/span&gt;possible&lt;span class="w"&gt; &lt;/span&gt;attack&lt;span class="w"&gt; &lt;/span&gt;scenario
would&lt;span class="w"&gt; &lt;/span&gt;involve&lt;span class="w"&gt; &lt;/span&gt;an&lt;span class="w"&gt; &lt;/span&gt;untrusted&lt;span class="w"&gt; &lt;/span&gt;party&lt;span class="w"&gt; &lt;/span&gt;which&lt;span class="w"&gt; &lt;/span&gt;controls&lt;span class="w"&gt; &lt;/span&gt;the&lt;span class="w"&gt; &lt;/span&gt;-TT&lt;span class="w"&gt; &lt;/span&gt;value.&lt;span class="w"&gt; &lt;/span&gt;Still
fill&lt;span class="w"&gt; &lt;/span&gt;a&lt;span class="w"&gt; &lt;/span&gt;but&lt;span class="w"&gt; &lt;/span&gt;for&lt;span class="w"&gt; &lt;/span&gt;tracking&lt;span class="w"&gt; &lt;/span&gt;the&lt;span class="w"&gt; &lt;/span&gt;bug/issue.

CVE-2018-13410[0]:
|&lt;span class="w"&gt; &lt;/span&gt;**&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;&amp;lt;A&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="na"&gt;HREF=&lt;/span&gt;&lt;span class="s"&gt;"https://cve.mitre.org/about/faqs.html#disputed_signify_in_cve_entry"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;DISPUTED&lt;span class="nt"&gt;&amp;lt;/A&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;**&lt;span class="w"&gt; &lt;/span&gt;Info-ZIP&lt;span class="w"&gt; &lt;/span&gt;Zip&lt;span class="w"&gt; &lt;/span&gt;3.0,&lt;span class="w"&gt; &lt;/span&gt;when&lt;span class="w"&gt; &lt;/span&gt;the&lt;span class="w"&gt; &lt;/span&gt;-T&lt;span class="w"&gt; &lt;/span&gt;and&lt;span class="w"&gt; &lt;/span&gt;-TT&lt;span class="w"&gt; &lt;/span&gt;command-line
|&lt;span class="w"&gt; &lt;/span&gt;options&lt;span class="w"&gt; &lt;/span&gt;are&lt;span class="w"&gt; &lt;/span&gt;used,&lt;span class="w"&gt; &lt;/span&gt;allows&lt;span class="w"&gt; &lt;/span&gt;attackers&lt;span class="w"&gt; &lt;/span&gt;to&lt;span class="w"&gt; &lt;/span&gt;cause&lt;span class="w"&gt; &lt;/span&gt;a&lt;span class="w"&gt; &lt;/span&gt;denial&lt;span class="w"&gt; &lt;/span&gt;of&lt;span class="w"&gt; &lt;/span&gt;service
|&lt;span class="w"&gt; &lt;/span&gt;(invalid&lt;span class="w"&gt; &lt;/span&gt;free&lt;span class="w"&gt; &lt;/span&gt;and&lt;span class="w"&gt; &lt;/span&gt;application&lt;span class="w"&gt; &lt;/span&gt;crash)&lt;span class="w"&gt; &lt;/span&gt;or&lt;span class="w"&gt; &lt;/span&gt;possibly&lt;span class="w"&gt; &lt;/span&gt;have&lt;span class="w"&gt; &lt;/span&gt;unspecified&lt;span class="w"&gt; &lt;/span&gt;other
|&lt;span class="w"&gt; &lt;/span&gt;impact&lt;span class="w"&gt; &lt;/span&gt;because&lt;span class="w"&gt; &lt;/span&gt;of&lt;span class="w"&gt; &lt;/span&gt;an&lt;span class="w"&gt; &lt;/span&gt;off-by-one&lt;span class="w"&gt; &lt;/span&gt;error.&lt;span class="w"&gt; &lt;/span&gt;NOTE:&lt;span class="w"&gt; &lt;/span&gt;it&lt;span class="w"&gt; &lt;/span&gt;is&lt;span class="w"&gt; &lt;/span&gt;unclear&lt;span class="w"&gt; &lt;/span&gt;whether
|&lt;span class="w"&gt; &lt;/span&gt;there&lt;span class="w"&gt; &lt;/span&gt;are&lt;span class="w"&gt; &lt;/span&gt;realistic&lt;span class="w"&gt; &lt;/span&gt;scenarios&lt;span class="w"&gt; &lt;/span&gt;in&lt;span class="w"&gt; &lt;/span&gt;which&lt;span class="w"&gt; &lt;/span&gt;an&lt;span class="w"&gt; &lt;/span&gt;untrusted&lt;span class="w"&gt; &lt;/span&gt;party&lt;span class="w"&gt; &lt;/span&gt;controls&lt;span class="w"&gt; &lt;/span&gt;the
|&lt;span class="w"&gt; &lt;/span&gt;-TT&lt;span class="w"&gt; &lt;/span&gt;value,&lt;span class="w"&gt; &lt;/span&gt;given&lt;span class="w"&gt; &lt;/span&gt;that&lt;span class="w"&gt; &lt;/span&gt;the&lt;span class="w"&gt; &lt;/span&gt;entire&lt;span class="w"&gt; &lt;/span&gt;purpose&lt;span class="w"&gt; &lt;/span&gt;of&lt;span class="w"&gt; &lt;/span&gt;-TT&lt;span class="w"&gt; &lt;/span&gt;is&lt;span class="w"&gt; &lt;/span&gt;execution&lt;span class="w"&gt; &lt;/span&gt;of
|&lt;span class="w"&gt; &lt;/span&gt;arbitrary&lt;span class="w"&gt; &lt;/span&gt;commands.

If&lt;span class="w"&gt; &lt;/span&gt;you&lt;span class="w"&gt; &lt;/span&gt;fix&lt;span class="w"&gt; &lt;/span&gt;the&lt;span class="w"&gt; &lt;/span&gt;vulnerability&lt;span class="w"&gt; &lt;/span&gt;please&lt;span class="w"&gt; &lt;/span&gt;also&lt;span class="w"&gt; &lt;/span&gt;make&lt;span class="w"&gt; &lt;/span&gt;sure&lt;span class="w"&gt; &lt;/span&gt;to&lt;span class="w"&gt; &lt;/span&gt;include&lt;span class="w"&gt; &lt;/span&gt;the
CVE&lt;span class="w"&gt; &lt;/span&gt;(Common&lt;span class="w"&gt; &lt;/span&gt;Vulnerabilities&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;amp;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;Exposures)&lt;span class="w"&gt; &lt;/span&gt;id&lt;span class="w"&gt; &lt;/span&gt;in&lt;span class="w"&gt; &lt;/span&gt;your&lt;span class="w"&gt; &lt;/span&gt;changelog&lt;span class="w"&gt; &lt;/span&gt;entry.

For&lt;span class="w"&gt; &lt;/span&gt;further&lt;span class="w"&gt; &lt;/span&gt;information&lt;span class="w"&gt; &lt;/span&gt;see:

[0]&lt;span class="w"&gt; &lt;/span&gt;https://security-tracker.debian.org/tracker/CVE-2018-13410
&lt;span class="w"&gt;    &lt;/span&gt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13410
[1]&lt;span class="w"&gt; &lt;/span&gt;http://seclists.org/fulldisclosure/2018/Jul/24
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Santiago Vila</dc:creator><pubDate>Tue, 22 Apr 2025 22:17:10 -0000</pubDate><guid>https://sourceforge.net12c4c1b6df8d2daaae81607434eabf63bfcc614a</guid></item></channel></rss>