All the vulnerabilites related to 7-Zip - 7-Zip
cve-2016-2335
Vulnerability from cvelistv5
Published
2016-06-07 14:00
Modified
2024-08-05 23:24
Severity ?
EPSS score ?
Summary
The CInArchive::ReadFileItem method in Archive/Udf/UdfIn.cpp in 7zip 9.20 and 15.05 beta and p7zip allows remote attackers to cause a denial of service (out-of-bounds read) or execute arbitrary code via the PartitionRef field in the Long Allocation Descriptor in a UDF file.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:24:49.056Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2016:1850", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00069.html" }, { "name": "FEDORA-2016-bbcb0e4eb4", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTGWICT3KYYDPDXRNO5SXD32GZICGRIR/" }, { "name": "openSUSE-SU-2016:1464", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00004.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html" }, { "name": "90531", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90531" }, { "name": "GLSA-201701-27", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-27" }, { "name": "1035876", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035876" }, { "name": "openSUSE-SU-2016:1675", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00098.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.talosintel.com/reports/TALOS-2016-0094/" }, { "name": "DSA-3599", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3599" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html" }, { "name": "FEDORA-2016-430bc0f808", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNYIQAU3FKFBNFPK6GKYTSVRHQA7PTYT/" }, { "name": "USN-3913-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3913-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The CInArchive::ReadFileItem method in Archive/Udf/UdfIn.cpp in 7zip 9.20 and 15.05 beta and p7zip allows remote attackers to cause a denial of service (out-of-bounds read) or execute arbitrary code via the PartitionRef field in the Long Allocation Descriptor in a UDF file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-21T19:06:08", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "openSUSE-SU-2016:1850", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00069.html" }, { "name": "FEDORA-2016-bbcb0e4eb4", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTGWICT3KYYDPDXRNO5SXD32GZICGRIR/" }, { "name": "openSUSE-SU-2016:1464", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00004.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html" }, { "name": "90531", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90531" }, { "name": "GLSA-201701-27", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-27" }, { "name": "1035876", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035876" }, { "name": "openSUSE-SU-2016:1675", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00098.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.talosintel.com/reports/TALOS-2016-0094/" }, { "name": "DSA-3599", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3599" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html" }, { "name": "FEDORA-2016-430bc0f808", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNYIQAU3FKFBNFPK6GKYTSVRHQA7PTYT/" }, { "name": "USN-3913-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3913-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-2335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CInArchive::ReadFileItem method in Archive/Udf/UdfIn.cpp in 7zip 9.20 and 15.05 beta and p7zip allows remote attackers to cause a denial of service (out-of-bounds read) or execute arbitrary code via the PartitionRef field in the Long Allocation Descriptor in a UDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2016:1850", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00069.html" }, { "name": "FEDORA-2016-bbcb0e4eb4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTGWICT3KYYDPDXRNO5SXD32GZICGRIR/" }, { "name": "openSUSE-SU-2016:1464", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00004.html" }, { "name": "http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html", "refsource": "MISC", "url": "http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html" }, { "name": "90531", "refsource": "BID", "url": "http://www.securityfocus.com/bid/90531" }, { "name": "GLSA-201701-27", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-27" }, { "name": "1035876", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035876" }, { "name": "openSUSE-SU-2016:1675", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00098.html" }, { "name": "http://www.talosintel.com/reports/TALOS-2016-0094/", "refsource": "MISC", "url": "http://www.talosintel.com/reports/TALOS-2016-0094/" }, { "name": "DSA-3599", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3599" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html" }, { "name": "FEDORA-2016-430bc0f808", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNYIQAU3FKFBNFPK6GKYTSVRHQA7PTYT/" }, { "name": "USN-3913-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3913-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-2335", "datePublished": "2016-06-07T14:00:00", "dateReserved": "2016-02-12T00:00:00", "dateUpdated": "2024-08-05T23:24:49.056Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-17969
Vulnerability from cvelistv5
Published
2018-01-30 16:00
Modified
2024-08-05 21:06
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the NCompress::NShrink::CDecoder::CodeReal method in 7-Zip before 18.00 and p7zip allows remote attackers to cause a denial of service (out-of-bounds write) or potentially execute arbitrary code via a crafted ZIP archive.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2018/dsa-4104 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2018/02/msg00003.html | mailing-list, x_refsource_MLIST | |
https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/ | x_refsource_MISC | |
http://www.securitytracker.com/id/1040831 | vdb-entry, x_refsource_SECTRACK | |
https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html | x_refsource_MISC | |
https://usn.ubuntu.com/3913-1/ | vendor-advisory, x_refsource_UBUNTU |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:49.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4104", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4104" }, { "name": "[debian-lts-announce] 20180202 [SECURITY] [DLA 1268-1] p7zip security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00003.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/" }, { "name": "1040831", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040831" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html" }, { "name": "USN-3913-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3913-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the NCompress::NShrink::CDecoder::CodeReal method in 7-Zip before 18.00 and p7zip allows remote attackers to cause a denial of service (out-of-bounds write) or potentially execute arbitrary code via a crafted ZIP archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-21T19:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4104", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4104" }, { "name": "[debian-lts-announce] 20180202 [SECURITY] [DLA 1268-1] p7zip security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00003.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/" }, { "name": "1040831", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040831" }, { "tags": [ "x_refsource_MISC" ], "url": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html" }, { "name": "USN-3913-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3913-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-17969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the NCompress::NShrink::CDecoder::CodeReal method in 7-Zip before 18.00 and p7zip allows remote attackers to cause a denial of service (out-of-bounds write) or potentially execute arbitrary code via a crafted ZIP archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4104", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4104" }, { "name": "[debian-lts-announce] 20180202 [SECURITY] [DLA 1268-1] p7zip security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00003.html" }, { "name": "https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/", "refsource": "MISC", "url": "https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/" }, { "name": "1040831", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040831" }, { "name": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html", "refsource": "MISC", "url": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html" }, { "name": "USN-3913-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3913-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-17969", "datePublished": "2018-01-30T16:00:00", "dateReserved": "2017-12-29T00:00:00", "dateUpdated": "2024-08-05T21:06:49.938Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-5996
Vulnerability from cvelistv5
Published
2018-01-31 18:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
Insufficient exception handling in the method NCompress::NRar3::CDecoder::Code of 7-Zip before 18.00 and p7zip can lead to multiple memory corruptions within the PPMd code, allows remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.
References
▼ | URL | Tags |
---|---|---|
https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/ | x_refsource_MISC | |
http://www.securitytracker.com/id/1040831 | vdb-entry, x_refsource_SECTRACK | |
https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:47:56.229Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/" }, { "name": "1040831", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040831" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient exception handling in the method NCompress::NRar3::CDecoder::Code of 7-Zip before 18.00 and p7zip can lead to multiple memory corruptions within the PPMd code, allows remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-19T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/" }, { "name": "1040831", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040831" }, { "tags": [ "x_refsource_MISC" ], "url": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-5996", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient exception handling in the method NCompress::NRar3::CDecoder::Code of 7-Zip before 18.00 and p7zip can lead to multiple memory corruptions within the PPMd code, allows remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/", "refsource": "MISC", "url": "https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/" }, { "name": "1040831", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040831" }, { "name": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html", "refsource": "MISC", "url": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-5996", "datePublished": "2018-01-31T18:00:00", "dateReserved": "2018-01-22T00:00:00", "dateUpdated": "2024-08-05T05:47:56.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-10115
Vulnerability from cvelistv5
Published
2018-05-02 21:00
Modified
2024-08-05 07:32
Severity ?
EPSS score ?
Summary
Incorrect initialization logic of RAR decoder objects in 7-Zip 18.03 and before can lead to usage of uninitialized memory, allowing remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.
References
▼ | URL | Tags |
---|---|---|
https://sourceforge.net/p/sevenzip/discussion/45797/thread/adc65bfa/ | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1040832 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/104132 | vdb-entry, x_refsource_BID | |
https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:32:01.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/adc65bfa/" }, { "name": "1040832", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040832" }, { "name": "104132", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104132" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect initialization logic of RAR decoder objects in 7-Zip 18.03 and before can lead to usage of uninitialized memory, allowing remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-11T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/adc65bfa/" }, { "name": "1040832", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040832" }, { "name": "104132", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104132" }, { "tags": [ "x_refsource_MISC" ], "url": "https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-10115", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect initialization logic of RAR decoder objects in 7-Zip 18.03 and before can lead to usage of uninitialized memory, allowing remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/adc65bfa/", "refsource": "CONFIRM", "url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/adc65bfa/" }, { "name": "1040832", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040832" }, { "name": "104132", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104132" }, { "name": "https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/", "refsource": "MISC", "url": "https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-10115", "datePublished": "2018-05-02T21:00:00", "dateReserved": "2018-04-14T00:00:00", "dateUpdated": "2024-08-05T07:32:01.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2334
Vulnerability from cvelistv5
Published
2016-12-13 22:00
Modified
2024-08-05 23:24
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the NArchive::NHfs::CHandler::ExtractZlibFile method in 7zip before 16.00 and p7zip allows remote attackers to execute arbitrary code via a crafted HFS+ image.
References
▼ | URL | Tags |
---|---|---|
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTGWICT3KYYDPDXRNO5SXD32GZICGRIR/ | vendor-advisory, x_refsource_FEDORA | |
http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html | x_refsource_MISC | |
http://www.talosintel.com/reports/TALOS-2016-0093/ | x_refsource_MISC | |
http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/90531 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201701-27 | vendor-advisory, x_refsource_GENTOO | |
http://www.securitytracker.com/id/1035876 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNYIQAU3FKFBNFPK6GKYTSVRHQA7PTYT/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:24:48.604Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2016-bbcb0e4eb4", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTGWICT3KYYDPDXRNO5SXD32GZICGRIR/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.talosintel.com/reports/TALOS-2016-0093/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html" }, { "name": "90531", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90531" }, { "name": "GLSA-201701-27", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-27" }, { "name": "1035876", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035876" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html" }, { "name": "FEDORA-2016-430bc0f808", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNYIQAU3FKFBNFPK6GKYTSVRHQA7PTYT/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the NArchive::NHfs::CHandler::ExtractZlibFile method in 7zip before 16.00 and p7zip allows remote attackers to execute arbitrary code via a crafted HFS+ image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-02T21:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "FEDORA-2016-bbcb0e4eb4", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTGWICT3KYYDPDXRNO5SXD32GZICGRIR/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.talosintel.com/reports/TALOS-2016-0093/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html" }, { "name": "90531", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90531" }, { "name": "GLSA-201701-27", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-27" }, { "name": "1035876", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035876" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html" }, { "name": "FEDORA-2016-430bc0f808", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNYIQAU3FKFBNFPK6GKYTSVRHQA7PTYT/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-2334", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the NArchive::NHfs::CHandler::ExtractZlibFile method in 7zip before 16.00 and p7zip allows remote attackers to execute arbitrary code via a crafted HFS+ image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2016-bbcb0e4eb4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTGWICT3KYYDPDXRNO5SXD32GZICGRIR/" }, { "name": "http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html", "refsource": "MISC", "url": "http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html" }, { "name": "http://www.talosintel.com/reports/TALOS-2016-0093/", "refsource": "MISC", "url": "http://www.talosintel.com/reports/TALOS-2016-0093/" }, { "name": "http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html", "refsource": "MISC", "url": "http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html" }, { "name": "90531", "refsource": "BID", "url": "http://www.securityfocus.com/bid/90531" }, { "name": "GLSA-201701-27", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-27" }, { "name": "1035876", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035876" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html" }, { "name": "FEDORA-2016-430bc0f808", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNYIQAU3FKFBNFPK6GKYTSVRHQA7PTYT/" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-2334", "datePublished": "2016-12-13T22:00:00", "dateReserved": "2016-02-12T00:00:00", "dateUpdated": "2024-08-05T23:24:48.604Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-10172
Vulnerability from cvelistv5
Published
2018-04-16 22:00
Modified
2024-08-05 07:32
Severity ?
EPSS score ?
Summary
7-Zip through 18.01 on Windows implements the "Large memory pages" option by calling the LsaAddAccountRights function to add the SeLockMemoryPrivilege privilege to the user's account, which makes it easier for attackers to bypass intended access restrictions by using this privilege in the context of a sandboxed process. Note: This has been disputed by 3rd parties who argue this is a valid feature of Windows.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:32:01.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/e730c709/?limit=25\u0026page=1#b240" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "7-Zip through 18.01 on Windows implements the \"Large memory pages\" option by calling the LsaAddAccountRights function to add the SeLockMemoryPrivilege privilege to the user\u0027s account, which makes it easier for attackers to bypass intended access restrictions by using this privilege in the context of a sandboxed process. Note: This has been disputed by 3rd parties who argue this is a valid feature of Windows." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-08T21:31:51.548670", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/e730c709/?limit=25\u0026page=1#b240" } ], "tags": [ "disputed" ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-10172", "datePublished": "2018-04-16T22:00:00", "dateReserved": "2018-04-16T00:00:00", "dateUpdated": "2024-08-05T07:32:01.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11477
Vulnerability from cvelistv5
Published
2024-11-22 20:22
Modified
2024-12-02 14:09
Severity ?
EPSS score ?
Summary
7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-1532/ | x_research-advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:7-zip:7zip:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "7zip", "vendor": "7-zip", "versions": [ { "lessThan": "24.07", "status": "affected", "version": "24.06", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11477", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-30T04:55:53.034971Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T14:09:05.550Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "7-Zip", "vendor": "7-Zip", "versions": [ { "status": "affected", "version": "24.06" } ] } ], "dateAssigned": "2024-11-19T16:30:03.091-06:00", "datePublic": "2024-11-20T14:07:56.456-06:00", "descriptions": [ { "lang": "en", "value": "7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the implementation of Zstandard decompression. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24346." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191: Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T20:22:33.278Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-1532", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1532/" } ], "source": { "lang": "en", "value": "Nicholas Zubrisky (@NZubrisky) of Trend Micro Security Research" }, "title": "7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-11477", "datePublished": "2024-11-22T20:22:33.278Z", "dateReserved": "2024-11-19T22:30:03.057Z", "dateUpdated": "2024-12-02T14:09:05.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11612
Vulnerability from cvelistv5
Published
2024-11-22 20:22
Modified
2024-11-26 15:13
Severity ?
EPSS score ?
Summary
7-Zip CopyCoder Infinite Loop Denial-of-Service Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-1606/ | x_research-advisory |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-11612", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T15:12:13.757081Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T15:13:29.515Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "7-Zip", "vendor": "7-Zip", "versions": [ { "status": "affected", "version": "24.06" } ] } ], "dateAssigned": "2024-11-21T14:34:17.572-06:00", "datePublic": "2024-11-21T15:23:18.351-06:00", "descriptions": [ { "lang": "en", "value": "7-Zip CopyCoder Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the processing of streams. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-24307." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T20:22:10.629Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-1606", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1606/" } ], "source": { "lang": "en", "value": "2ourc3" }, "title": "7-Zip CopyCoder Infinite Loop Denial-of-Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-11612", "datePublished": "2024-11-22T20:22:10.629Z", "dateReserved": "2024-11-21T20:34:17.530Z", "dateUpdated": "2024-11-26T15:13:29.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40481
Vulnerability from cvelistv5
Published
2024-05-03 02:11
Modified
2024-08-02 18:31
Severity ?
EPSS score ?
Summary
7-Zip SquashFS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1164/ | x_research-advisory | |
https://sourceforge.net/p/sevenzip/discussion/45797/thread/713c8a8269/ | vendor-advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:7-zip:7-zip:22.01:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "7-zip", "vendor": "7-zip", "versions": [ { "status": "affected", "version": "22.01" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-40481", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-05T19:54:59.839999Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-05T20:02:31.156Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T18:31:53.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1164", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1164/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/713c8a8269/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "7-Zip", "vendor": "7-Zip", "versions": [ { "status": "affected", "version": "22.01" } ] } ], "dateAssigned": "2023-08-14T16:14:46.703-05:00", "datePublic": "2023-08-23T14:39:33.970-05:00", "descriptions": [ { "lang": "en", "value": "7-Zip SquashFS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SQFS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18589." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:11:15.923Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1164", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1164/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/713c8a8269/" } ], "source": { "lang": "en", "value": "goodbyeselene" }, "title": "7-Zip SquashFS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-40481", "datePublished": "2024-05-03T02:11:15.923Z", "dateReserved": "2023-08-14T21:06:28.913Z", "dateUpdated": "2024-08-02T18:31:53.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4725
Vulnerability from cvelistv5
Published
2007-09-05 19:00
Modified
2024-08-07 15:08
Severity ?
EPSS score ?
Summary
Stack consumption vulnerability in AkkyWareHOUSE 7-zip32.dll before 4.42.00.04, as derived from Igor Pavlov 7-Zip before 4.53 beta, allows user-assisted remote attackers to execute arbitrary code via a long filename in an archive, leading to a heap-based buffer overflow.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26624 | third-party-advisory, x_refsource_SECUNIA | |
http://jvn.jp/jp/JVN%2362868899/index.html | third-party-advisory, x_refsource_JVN | |
http://www.securityfocus.com/bid/25545 | vdb-entry, x_refsource_BID | |
http://sourceforge.net/project/shownotes.php?release_id=535160&group_id=14481 | x_refsource_MISC | |
http://osvdb.org/40482 | vdb-entry, x_refsource_OSVDB | |
http://akky.cjb.net/security/7-zip3.txt | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/3086 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36459 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:08:32.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26624", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26624" }, { "name": "JVN#62868899", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/jp/JVN%2362868899/index.html" }, { "name": "25545", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25545" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=535160\u0026group_id=14481" }, { "name": "40482", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/40482" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://akky.cjb.net/security/7-zip3.txt" }, { "name": "ADV-2007-3086", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3086" }, { "name": "akkywarehouse-zip-bo(36459)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36459" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack consumption vulnerability in AkkyWareHOUSE 7-zip32.dll before 4.42.00.04, as derived from Igor Pavlov 7-Zip before 4.53 beta, allows user-assisted remote attackers to execute arbitrary code via a long filename in an archive, leading to a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26624", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26624" }, { "name": "JVN#62868899", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/jp/JVN%2362868899/index.html" }, { "name": "25545", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25545" }, { "tags": [ "x_refsource_MISC" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=535160\u0026group_id=14481" }, { "name": "40482", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/40482" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://akky.cjb.net/security/7-zip3.txt" }, { "name": "ADV-2007-3086", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3086" }, { "name": "akkywarehouse-zip-bo(36459)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36459" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4725", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack consumption vulnerability in AkkyWareHOUSE 7-zip32.dll before 4.42.00.04, as derived from Igor Pavlov 7-Zip before 4.53 beta, allows user-assisted remote attackers to execute arbitrary code via a long filename in an archive, leading to a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26624", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26624" }, { "name": "JVN#62868899", "refsource": "JVN", "url": "http://jvn.jp/jp/JVN%2362868899/index.html" }, { "name": "25545", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25545" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=535160\u0026group_id=14481", "refsource": "MISC", "url": "http://sourceforge.net/project/shownotes.php?release_id=535160\u0026group_id=14481" }, { "name": "40482", "refsource": "OSVDB", "url": "http://osvdb.org/40482" }, { "name": "http://akky.cjb.net/security/7-zip3.txt", "refsource": "CONFIRM", "url": "http://akky.cjb.net/security/7-zip3.txt" }, { "name": "ADV-2007-3086", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3086" }, { "name": "akkywarehouse-zip-bo(36459)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36459" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4725", "datePublished": "2007-09-05T19:00:00", "dateReserved": "2007-09-05T00:00:00", "dateUpdated": "2024-08-07T15:08:32.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31102
Vulnerability from cvelistv5
Published
2023-11-03 00:00
Modified
2024-09-06 13:43
Severity ?
EPSS score ?
Summary
Ppmd7.c in 7-Zip before 23.00 allows an integer underflow and invalid read operation via a crafted 7Z archive.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:45:25.573Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.7-zip.org/download.html" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1165/" }, { "tags": [ "x_transferred" ], "url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/713c8a8269/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231110-0007/" }, { "tags": [ "x_transferred" ], "url": "https://ds-security.com/post/integer-overflow-in-7-zip-cve-2023-31102/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-31102", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-06T13:42:37.861414Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191 Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-06T13:43:35.116Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ppmd7.c in 7-Zip before 23.00 allows an integer underflow and invalid read operation via a crafted 7Z archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-19T23:19:50.952739", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.7-zip.org/download.html" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1165/" }, { "url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/713c8a8269/" }, { "url": "https://security.netapp.com/advisory/ntap-20231110-0007/" }, { "url": "https://ds-security.com/post/integer-overflow-in-7-zip-cve-2023-31102/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-31102", "datePublished": "2023-11-03T00:00:00", "dateReserved": "2023-04-24T00:00:00", "dateUpdated": "2024-09-06T13:43:35.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29072
Vulnerability from cvelistv5
Published
2022-04-15 19:54
Modified
2024-08-03 06:10
Severity ?
EPSS score ?
Summary
7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area. This is caused by misconfiguration of 7z.dll and a heap overflow. The command runs in a child process under the 7zFM.exe process. NOTE: multiple third parties have reported that no privilege escalation can occur
References
▼ | URL | Tags |
---|---|---|
https://sourceforge.net/p/sevenzip/bugs/2337/ | x_refsource_MISC | |
https://www.youtube.com/watch?v=sT1cvbu7ZTA | x_refsource_MISC | |
https://github.com/kagancapar/CVE-2022-29072 | x_refsource_MISC | |
https://news.ycombinator.com/item?id=31070256 | x_refsource_MISC | |
http://packetstormsecurity.com/files/166763/7-Zip-21.07-Code-Execution-Privilege-Escalation.html | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:7-zip:7zip:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "7zip", "vendor": "7-zip", "versions": [ { "lessThanOrEqual": "21.07", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-29072", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T19:22:42.604521Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-11T19:21:41.315Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T06:10:59.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sourceforge.net/p/sevenzip/bugs/2337/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=sT1cvbu7ZTA" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kagancapar/CVE-2022-29072" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://news.ycombinator.com/item?id=31070256" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/166763/7-Zip-21.07-Code-Execution-Privilege-Escalation.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help\u003eContents area. This is caused by misconfiguration of 7z.dll and a heap overflow. The command runs in a child process under the 7zFM.exe process. NOTE: multiple third parties have reported that no privilege escalation can occur" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-22T14:19:49", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://sourceforge.net/p/sevenzip/bugs/2337/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=sT1cvbu7ZTA" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kagancapar/CVE-2022-29072" }, { "tags": [ "x_refsource_MISC" ], "url": "https://news.ycombinator.com/item?id=31070256" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/166763/7-Zip-21.07-Code-Execution-Privilege-Escalation.html" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-29072", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help\u003eContents area. This is caused by misconfiguration of 7z.dll and a heap overflow. The command runs in a child process under the 7zFM.exe process. NOTE: multiple third parties have reported that no privilege escalation can occur." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://sourceforge.net/p/sevenzip/bugs/2337/", "refsource": "MISC", "url": "https://sourceforge.net/p/sevenzip/bugs/2337/" }, { "name": "https://www.youtube.com/watch?v=sT1cvbu7ZTA", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=sT1cvbu7ZTA" }, { "name": "https://github.com/kagancapar/CVE-2022-29072", "refsource": "MISC", "url": "https://github.com/kagancapar/CVE-2022-29072" }, { "name": "https://news.ycombinator.com/item?id=31070256", "refsource": "MISC", "url": "https://news.ycombinator.com/item?id=31070256" }, { "name": "http://packetstormsecurity.com/files/166763/7-Zip-21.07-Code-Execution-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/166763/7-Zip-21.07-Code-Execution-Privilege-Escalation.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-29072", "datePublished": "2022-04-15T19:54:15", "dateReserved": "2022-04-12T00:00:00", "dateUpdated": "2024-08-03T06:10:59.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-7804
Vulnerability from cvelistv5
Published
2017-05-22 16:00
Modified
2024-08-06 02:04
Severity ?
EPSS score ?
Summary
Untrusted search path vulnerability in 7 Zip for Windows 16.02 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
References
▼ | URL | Tags |
---|---|---|
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000211 | third-party-advisory, x_refsource_JVNDB | |
https://jvn.jp/en/jp/JVN76780067/index.html | third-party-advisory, x_refsource_JVN | |
http://www.7-zip.org/history.txt | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Igor Pavlov | 7 Zip for Windows |
Version: 16.02 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:04:56.045Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVNDB-2016-000211", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000211" }, { "name": "JVN#76780067", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN76780067/index.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.7-zip.org/history.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "7 Zip for Windows", "vendor": "Igor Pavlov", "versions": [ { "status": "affected", "version": "16.02 and earlier" } ] } ], "datePublic": "2016-09-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in 7 Zip for Windows 16.02 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory." } ], "problemTypes": [ { "descriptions": [ { "description": "Untrusted search path vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-22T15:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVNDB-2016-000211", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000211" }, { "name": "JVN#76780067", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "https://jvn.jp/en/jp/JVN76780067/index.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.7-zip.org/history.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2016-7804", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "7 Zip for Windows", "version": { "version_data": [ { "version_value": "16.02 and earlier" } ] } } ] }, "vendor_name": "Igor Pavlov" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in 7 Zip for Windows 16.02 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Untrusted search path vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "JVNDB-2016-000211", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000211" }, { "name": "JVN#76780067", "refsource": "JVN", "url": "https://jvn.jp/en/jp/JVN76780067/index.html" }, { "name": "http://www.7-zip.org/history.txt", "refsource": "CONFIRM", "url": "http://www.7-zip.org/history.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2016-7804", "datePublished": "2017-05-22T16:00:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T02:04:56.045Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-6536
Vulnerability from cvelistv5
Published
2009-03-30 01:00
Modified
2024-08-07 11:34
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in 7-zip before 4.5.7 has unknown impact and remote attack vectors, as demonstrated by the PROTOS GENOME test suite for Archive Formats (c10).
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/0914/references | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/29434 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41247 | vdb-entry, x_refsource_XF | |
http://osvdb.org/43649 | vdb-entry, x_refsource_OSVDB | |
http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/28285 | vdb-entry, x_refsource_BID | |
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:34:46.335Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-0914", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0914/references" }, { "name": "29434", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29434" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "name": "7zip-archives-code-execution(41247)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41247" }, { "name": "43649", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/43649" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/" }, { "name": "28285", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28285" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in 7-zip before 4.5.7 has unknown impact and remote attack vectors, as demonstrated by the PROTOS GENOME test suite for Archive Formats (c10)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2008-0914", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0914/references" }, { "name": "29434", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29434" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "name": "7zip-archives-code-execution(41247)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41247" }, { "name": "43649", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/43649" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/" }, { "name": "28285", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28285" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6536", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in 7-zip before 4.5.7 has unknown impact and remote attack vectors, as demonstrated by the PROTOS GENOME test suite for Archive Formats (c10)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-0914", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0914/references" }, { "name": "29434", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29434" }, { "name": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html", "refsource": "MISC", "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "name": "7zip-archives-code-execution(41247)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41247" }, { "name": "43649", "refsource": "OSVDB", "url": "http://osvdb.org/43649" }, { "name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/", "refsource": "MISC", "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/" }, { "name": "28285", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28285" }, { "name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", "refsource": "CONFIRM", "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6536", "datePublished": "2009-03-30T01:00:00", "dateReserved": "2009-03-29T00:00:00", "dateUpdated": "2024-08-07T11:34:46.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
jvndb-2016-000211
Vulnerability from jvndb
Published
2016-10-26 15:13
Modified
2017-12-25 10:27
Severity ?
Summary
Installer of 7-Zip for Windows may insecurely load Dynamic Link Libraries
Details
7-Zip for Windows is an open source compression and decompression software. The installer of 7-Zip for Windows contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries.
Takashi Yoshikawa of Mitsui Bussan Secure Directions reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000211.html", "dc:date": "2017-12-25T10:27+09:00", "dcterms:issued": "2016-10-26T15:13+09:00", "dcterms:modified": "2017-12-25T10:27+09:00", "description": "7-Zip for Windows is an open source compression and decompression software. The installer of 7-Zip for Windows contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries.\r\n\r\nTakashi Yoshikawa of Mitsui Bussan Secure Directions reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000211.html", "sec:cpe": { "#text": "cpe:/a:7-zip:7-zip", "@product": "7-Zip", "@vendor": "7-Zip", "@version": "2.2" }, "sec:cvss": [ { "@score": "6.8", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "@version": "2.0" }, { "@score": "7.8", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "@version": "3.0" } ], "sec:identifier": "JVNDB-2016-000211", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN76780067/index.html", "@id": "JVN#76780067", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7804", "@id": "CVE-2016-7804", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-7804", "@id": "CVE-2016-7804", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "Installer of 7-Zip for Windows may insecurely load Dynamic Link Libraries" }