Vulnerability Description
Stack-based buffer overflow in Jzip 1.3 through 2.0.0.132900 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file name in a zip archive.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jzip | Jzip | 1.3 |
Related Weaknesses (CWE)
References
- http://osvdb.org/show/osvdb/65041
- http://packetstormsecurity.com/files/126216/Jzip-2.0.0.132900-Buffer-Overflow.htExploit
- http://seclists.org/fulldisclosure/2010/Apr/79
- http://www.exploit-db.com/exploits/32899Exploit
- https://www.corelan.be/index.php/forum/security-advisories-archive-2010/corelan-
- http://osvdb.org/show/osvdb/65041
- http://packetstormsecurity.com/files/126216/Jzip-2.0.0.132900-Buffer-Overflow.htExploit
- http://seclists.org/fulldisclosure/2010/Apr/79
- http://www.exploit-db.com/exploits/32899Exploit
- https://www.corelan.be/index.php/forum/security-advisories-archive-2010/corelan-
FAQ
What is CVE-2010-5300?
CVE-2010-5300 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Stack-based buffer overflow in Jzip 1.3 through 2.0.0.132900 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file name in a zip archive.
How severe is CVE-2010-5300?
CVE-2010-5300 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-5300?
Check the references section above for vendor advisories and patch information. Affected products include: Jzip Jzip.