ArchLinux: 201503-9: unzip: arbitrary code execution
Summary
A buffer overflow (out-of-bounds read or write) in test_compr_eb() in extract.c was found in the way unzip handled an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression. A specially crafted Zip archive could cause unzip to crash or, possibly, execute arbitrary code.
Resolution
Upgrade to 6.0-10.
# pacman -Syu "unzip>=6.0-10"
The problems have not been fixed upstream but patches were added.
References
;t=450 https://access.redhat.com/security/cve/CVE-2014-9636 https://bugs.archlinux.org/task/44171
![Dist Arch](/images/distros/dist-arch.png)
Workaround
None.