An integer overflow vulnerability was reported in libzip <= 0.10 when processing certain corrupt zip files. When libzip opens a zip file, it reads in the size and the offset of the central directory structure and, while it performs a consistency check on these values, it does not anticipate an integer overflow. In this case libzip will continue to process the zip file, which may result in the improper restrictions of operations within the bounds of a memory buffer. Acknowledgements: Red Hat would like to thank Timo Warns for reporting this issue.
Created attachment 570438 [details] patch from upstream
This is now public: http://nih.at/listarchive/libzip-discuss/msg00252.html http://hg.nih.at/libzip?fd=cb69d6146a09;file=lib/zip_open.c
Created php tracking bugs for this issue Affects: fedora-all [bug 805104]
Created libzip tracking bugs for this issue Affects: fedora-all [bug 805102]
The vulnerability was introduced by patch http://hg.nih.at/libzip?cs=feb6cbf7e8c4 in version 0.10. Statement: Not vulnerable. This issue did not affect the versions of libzip and php as shipped with Red Hat Enterprise Linux 6. This issue did not affect the versions of php53 as shipped with Red Hat Enterprise Linux 5.
libzip-0.10.1-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
Vulnerability was introduced in a version later than shipped with F15 and F16. F17 now ships version 0.10.1, which fixes the issue.
References: http://nih.at/listarchive/libzip-discuss/msg00252.html http://www.openwall.com/lists/oss-security/2012/03/21/2 http://www.openwall.com/lists/oss-security/2012/03/29/11 http://www.nih.at/libzip/NEWS.html http://www.gentoo.org/security/en/glsa/glsa-201203-23.xml http://www.mandriva.com/security/advisories?name=MDVSA-2012:034