USN-4672-1

Source
https://ubuntu.com/security/notices/USN-4672-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4672-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-4672-1
Related
Published
2020-12-16T17:27:07.818928Z
Modified
2020-12-16T17:27:07.818928Z
Summary
unzip vulnerabilities
Details

Rene Freingruber discovered that unzip incorrectly handled certain specially crafted password protected ZIP archives. If a user or automated system using unzip were tricked into opening a specially crafted zip file, an attacker could exploit this to cause a crash, resulting in a denial of service. (CVE-2018-1000035)

Antonio Carista discovered that unzip incorrectly handled certain specially crafted ZIP archives. If a user or automated system using unzip were tricked into opening a specially crafted zip file, an attacker could exploit this to cause a crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. (CVE-2018-18384)

It was discovered that unzip incorrectly handled certain specially crafted ZIP archives. If a user or automated system using unzip were tricked into opening a specially crafted zip file, an attacker could exploit this to cause resource consumption, resulting in a denial of service. (CVE-2019-13232)

Martin Carpenter discovered that unzip incorrectly handled certain specially crafted ZIP archives. If a user or automated system using unzip were tricked into opening a specially crafted zip file, an attacker could exploit this to cause a crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS. (CVE-2014-9913)

Alexis Vanden Eijnde discovered that unzip incorrectly handled certain specially crafted ZIP archives. If a user or automated system using unzip were tricked into opening a specially crafted zip file, an attacker could exploit this to cause a crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS. (CVE-2016-9844)

References

Affected packages

Ubuntu:Pro:14.04:LTS / unzip

Package

Name
unzip
Purl
pkg:deb/ubuntu/unzip?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0-9ubuntu1.6

Affected versions

6.*

6.0-9ubuntu1
6.0-9ubuntu1.1
6.0-9ubuntu1.2
6.0-9ubuntu1.3
6.0-9ubuntu1.4
6.0-9ubuntu1.5

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "6.0-9ubuntu1.6",
            "binary_name": "unzip"
        }
    ]
}

Ubuntu:16.04:LTS / unzip

Package

Name
unzip
Purl
pkg:deb/ubuntu/unzip?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0-20ubuntu1.1

Affected versions

6.*

6.0-17ubuntu1
6.0-19ubuntu1
6.0-19ubuntu2
6.0-20ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "6.0-20ubuntu1.1",
            "binary_name": "unzip"
        },
        {
            "binary_version": "6.0-20ubuntu1.1",
            "binary_name": "unzip-dbgsym"
        }
    ]
}

Ubuntu:18.04:LTS / unzip

Package

Name
unzip
Purl
pkg:deb/ubuntu/unzip?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0-21ubuntu1.1

Affected versions

6.*

6.0-21ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "6.0-21ubuntu1.1",
            "binary_name": "unzip"
        },
        {
            "binary_version": "6.0-21ubuntu1.1",
            "binary_name": "unzip-dbgsym"
        }
    ]
}