Directory traversal vulnerability in the do_extract_currentfile function in miniunz.c in miniunzip in minizip before 1.1-5 might allow remote attackers to write to arbitrary files via a crafted entry in a ZIP archive.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/12/31/11 | Issue Tracking Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/01/03/16 | Issue Tracking Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2024/01/24/10 | |
http://www.securityfocus.com/bid/71846 | Third Party Advisory VDB Entry |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774321 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-01-16 19:29
Updated : 2024-01-24 21:15
NVD link : CVE-2014-9485
Mitre link : CVE-2014-9485
CVE.ORG link : CVE-2014-9485
JSON object : View
Products Affected
minizip_project
- minizip
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')