CVE-2005-4667
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
31/12/2005
Last modified:
03/04/2025
Description
Buffer overflow in UnZip 5.50 and earlier allows user-assisted attackers to execute arbitrary code via a long filename command line argument. NOTE: since the overflow occurs in a non-setuid program, there are not many scenarios under which it poses a vulnerability, unless unzip is passed long arguments when it is invoked from other programs.
Impact
Base Score 2.0
3.70
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:info-zip:unzip:5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:info-zip:unzip:5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:info-zip:unzip:5.31:*:*:*:*:*:*:* | ||
| cpe:2.3:a:info-zip:unzip:5.32:*:*:*:*:*:*:* | ||
| cpe:2.3:a:info-zip:unzip:5.40:*:*:*:*:*:*:* | ||
| cpe:2.3:a:info-zip:unzip:5.41:*:*:*:*:*:*:* | ||
| cpe:2.3:a:info-zip:unzip:5.42:*:*:*:*:*:*:* | ||
| cpe:2.3:a:info-zip:unzip:5.50:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0930.html
- http://secunia.com/advisories/25098
- http://www.debian.org/security/2006/dsa-1012
- http://www.info-zip.org/FAQ.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A050
- http://www.osvdb.org/22400
- http://www.redhat.com/support/errata/RHSA-2007-0203.html
- http://www.securityfocus.com/archive/1/430300/100/0/threaded
- http://www.securityfocus.com/bid/15968
- http://www.trustix.org/errata/2006/0006
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11252
- https://usn.ubuntu.com/248-1/
- https://usn.ubuntu.com/248-2/
- http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0930.html
- http://secunia.com/advisories/25098
- http://www.debian.org/security/2006/dsa-1012
- http://www.info-zip.org/FAQ.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A050
- http://www.osvdb.org/22400
- http://www.redhat.com/support/errata/RHSA-2007-0203.html
- http://www.securityfocus.com/archive/1/430300/100/0/threaded
- http://www.securityfocus.com/bid/15968
- http://www.trustix.org/errata/2006/0006
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11252
- https://usn.ubuntu.com/248-1/
- https://usn.ubuntu.com/248-2/



