CVE-2019-16892
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/09/2019
Last modified:
28/12/2023
Description
In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
7.10
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:rubyzip_project:rubyzip:*:*:*:*:*:*:*:* | 1.3.0 (excluding) | |
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:cloudforms:4.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:cloudforms:5.11:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/errata/RHBA-2019:4047
- https://access.redhat.com/errata/RHSA-2019:4201
- https://github.com/rubyzip/rubyzip/commit/d65fe7bd283ec94f9d6dc7605f61a6b0dd00f55e
- https://github.com/rubyzip/rubyzip/pull/403
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J45KSFPP6DFVWLC7Z73L7SX735CKZYO6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWWPORMSBHZTMP4PGF4DQD22TTKBQMMC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X255K6ZBAQC462PQN2ND5HOTTQEJ2G2X/