Debian DSA-624-1 : zip - buffer overflow

Critical Nessus Plugin ID 16102


The remote Debian host is missing a security-related update.


A buffer overflow has been discovered in zip, the archiver for .zip files. When doing recursive folder compression the program did not check the resulting path length, which would lead to memory being overwritten. A malicious person could convince a user to create an archive containing a specially crafted path name, which could lead to the execution of arbitrary code.


Upgrade the zip package.

For the stable distribution (woody) this problem has been fixed in version 2.30-5woody2.

See Also

Plugin Details

Severity: Critical

ID: 16102

File Name: debian_DSA-624.nasl

Version: $Revision: 1.16 $

Type: local

Agent: unix

Published: 2005/01/06

Modified: 2016/04/28

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:zip, cpe:/o:debian:debian_linux:3.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2005/01/05

Vulnerability Publication Date: 2004/11/03

Reference Information

CVE: CVE-2004-1010

OSVDB: 11414

DSA: 624