CVE-2018-18384

NameCVE-2018-18384
DescriptionInfo-ZIP UnZip 6.0 has a buffer overflow in list.c, when a ZIP archive has a crafted relationship between the compressed-size value and the uncompressed-size value, because a buffer size is 10 and is supposed to be 12.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs741384

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
unzip (PTS)stretch6.0-21+deb9u2fixed
buster6.0-23+deb10u1fixed
bullseye, sid6.0-25fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
unzipsource(unstable)6.0-11741384

Notes

https://bugzilla.suse.com/show_bug.cgi?id=1110194
https://sourceforge.net/p/infozip/bugs/53/
The cfactorstr buffer was already increased to 12 with the
07-increase-size-of-cfactorstr.patch patch as applied for #741384
Upstream confirmed as well this is indeed enough as per
https://sourceforge.net/p/infozip/bugs/53/#ba07

Search for package or bug name: Reporting problems