MEDIUM · 5.5

CVE-2019-16892

In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service...

Vulnerability Description

In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).

CVSS Score

5.5

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
Rubyzip ProjectRubyzip< 1.3.0
FedoraprojectFedora29
RedhatCloudforms4.7

References

FAQ

What is CVE-2019-16892?

CVE-2019-16892 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service...

How severe is CVE-2019-16892?

CVE-2019-16892 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-16892?

Check the references section above for vendor advisories and patch information. Affected products include: Rubyzip Project Rubyzip, Fedoraproject Fedora, Redhat Cloudforms.